Comparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity

dc.contributor.authorSadikov Sh.M.
dc.date.accessioned2026-01-01T10:47:13Z
dc.date.issued2023-08-08
dc.description.abstractthe article examines the processes of ensuring the security of the database, the creation and research of the database of users of the protected corporate network, one of the important tasks in ensuring the security of the database of users of the corporate network is the provision of Information Integrity, models of ensuring security
dc.formatapplication/pdf
dc.identifier.urihttps://zienjournals.com/index.php/tjet/article/view/4289
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/60838
dc.language.isoeng
dc.publisherZien Journals
dc.relationhttps://zienjournals.com/index.php/tjet/article/view/4289/3546
dc.rightshttps://creativecommons.org/licenses/by-nc/4.0
dc.sourceTexas Journal of Engineering and Technology; Vol. 23 (2023): TJET; 14-19
dc.source2770-4491
dc.subjectdatabase
dc.subjectcorporate network
dc.subjectprivacy
dc.titleComparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
shm_2023_comparative_analysis_of_database_securit.pdf
item.page.filesection.size
197.46 KB
item.page.filesection.format
Adobe Portable Document Format

item.page.collections