Security maturity in NoSQL databases - are they secure enough to haul the modern IT applications?
Sethuraman SrinivasArchana NairPublished in: ICACCI (2015)
Keyphrases
- databases
- security issues
- security requirements
- relational databases
- security level
- data management
- security mechanisms
- data security
- key management
- security measures
- data integration
- security analysis
- security management
- data encryption
- information security
- security protocols
- key agreement protocol
- cryptographic protocols
- security properties
- key exchange protocol
- security architecture
- intrusion detection
- access control
- statistical databases
- diffie hellman
- security services
- electronic voting
- security patterns
- stream cipher
- electronic payment
- database
- security model
- secure multiparty computation
- authentication mechanism
- integrity verification
- previously mentioned
- user authentication
- digital signature scheme
- mobile agent system
- public key cryptography
- key exchange
- knowledge discovery
- public key encryption
- security policies
- data integrity
- public key infrastructure
- database systems
- key agreement
- unauthorized access
- sensitive data
- network security
- authentication protocol
- digital rights management
- encryption scheme
- secure routing
- key distribution
- rfid systems
- key management scheme
- identity management
- trusted computing
- authentication scheme
- cloud computing
- key establishment
- data warehouse
- privacy preserving
- secure communication
- smart card
- data model