- Kaladhar VorugantiAffiliated withNetwork Appliance
Storage (and the appropriate manipulation capabilities) should only be accessible and visible to users with the appropriate permissions
Users should be notified if their data has been tampered with or altered either intentionally or unintentionally
Malicious users should not be allowed to access or tamper with other people’s storage. If possible, the system should be able to catch malicious users.
User’s data should be physically deleted at the appropriate time. That is, it should not be present past its intended life-time
Tracking unauthorized copying or access control delegations is also an important security concern.
Security has been a key computer science to ...
Reference Work Entry Metrics
- Storage Security
- Reference Work Title
- Encyclopedia of Database Systems
- pp 2827-2829
- Print ISBN
- Online ISBN
- Springer US
- Copyright Holder
- Springer Science+Business Media, LLC
- Additional Links
- Industry Sectors
- eBook Packages
- Editor Affiliations
- 1. College of Computing, Georgia Institute of Technology
- 2. Database Research Group David R. Cheriton School of Computer Science, University of Waterloo
- Author Affiliations
- 1. Network Appliance, Sunnyvale, CA, USA
To view the rest of this content please follow the download PDF link above.