Keyphrases
- relational databases
- information security
- security issues
- chapter presents
- security requirements
- network security
- access control
- big data
- intrusion detection
- security threats
- security problems
- data integration
- statistical databases
- data management
- data security
- table of contents
- case study
- security policies
- computer security
- key management
- cutting edge
- cd rom
- database design
- security mechanisms
- functional requirements
- computer networks
- end users
- security measures