Comparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity
| dc.contributor.author | Sadikov Sh.M. | |
| dc.date.accessioned | 2026-01-01T10:47:13Z | |
| dc.date.issued | 2023-08-08 | |
| dc.description.abstract | the article examines the processes of ensuring the security of the database, the creation and research of the database of users of the protected corporate network, one of the important tasks in ensuring the security of the database of users of the corporate network is the provision of Information Integrity, models of ensuring security | |
| dc.format | application/pdf | |
| dc.identifier.uri | https://zienjournals.com/index.php/tjet/article/view/4289 | |
| dc.identifier.uri | https://asianeducationindex.com/handle/123456789/60838 | |
| dc.language.iso | eng | |
| dc.publisher | Zien Journals | |
| dc.relation | https://zienjournals.com/index.php/tjet/article/view/4289/3546 | |
| dc.rights | https://creativecommons.org/licenses/by-nc/4.0 | |
| dc.source | Texas Journal of Engineering and Technology; Vol. 23 (2023): TJET; 14-19 | |
| dc.source | 2770-4491 | |
| dc.subject | database | |
| dc.subject | corporate network | |
| dc.subject | privacy | |
| dc.title | Comparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity | |
| dc.type | info:eu-repo/semantics/article | |
| dc.type | info:eu-repo/semantics/publishedVersion | |
| dc.type | Peer-reviewed Article |
item.page.files
item.page.filesection.original.bundle
pagination.showing.detail
loading.default
- item.page.filesection.name
- shm_2023_comparative_analysis_of_database_securit.pdf
- item.page.filesection.size
- 197.46 KB
- item.page.filesection.format
- Adobe Portable Document Format