Movatterモバイル変換


[0]ホーム

URL:


Solsol et al., 2019 - Google Patents

Security mechanisms in NoSQL dbms's: A technical review

Solsol et al., 2019

Document ID
11320691202847798485
Author
Solsol I
Vargas H
Díaz G
Publication year
Publication venue
International Conference on Smart Technologies, Systems and Applications

External Links

Snippet

The exponential growth of data in organizations, together with the success reported by large companies such as Facebook, Google or Twitter, has promoted to the migration of a large number of applications to the use of NoSQL databases, due to their scalability and …
Continue reading atlink.springer.com (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30477Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/3015Redundancy elimination performed by the file system
    • G06F17/30153Redundancy elimination performed by the file system using compression, e.g. sparse files
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30091File storage and access structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30289Database design, administration or maintenance

Similar Documents

PublicationPublication DateTitle
Awaysheh et al.Next-generation big data federation access control: A reference model
Sharma et al.Securing big data hadoop: a review of security issues, threats and solution
US11290446B2 (en)Access to data stored in a cloud
US9894040B2 (en)Trust services for securing data in the cloud
US9223807B2 (en)Role-oriented database record field security model
KR102396643B1 (en) API and encryption key secret management system and method
Hu et al.An access control scheme for big data processing
US20150271267A1 (en)Content-oriented federated object store
Dewang et al.Data secure application: An application that allows developers to store user data securely using blockchain and IPFS
SinghSecurity analysis of mongodb
Ankomah et al.A comparative analysis of security features and concerns in NoSQL databases
Dean et al.Engineering scalable, secure, multi-tenant cloud for healthcare data
Joshi et al.Mitigating data segregation and privacy issues in cloud computing
Kapil et al.Big data security challenges: Hadoop perspective
Solsol et al.Security mechanisms in NoSQL dbms’s: A technical review
Behera et al.Big data security threats and prevention measures in cloud and Hadoop
Saxena et al.An insightful view on security and performance of NoSQL databases
Gattoju et al.A Survey on Security of the Hadoop Framework in the Environment of Bigdata
Johri et al.Security framework using Hadoop for big data
NarayananSecuring hadoop
Sawant et al.Analysis of various blockchain-based solutions for electronic health record system
HASSAN BIJIKA review on securing distributed Big Data Storage in Cloud Environment
Khosla et al.Big data security solutions in cloud
Balamurugan et al.An enhanced security framework for a cloud application
Kumar et al.Security Analysis of Mongodb

[8]
ページ先頭

©2009-2025 Movatter.jp