Middleware non-repudiation service for the data warehouse
نویسندگان
چکیده
منابع مشابه
Middleware non-repudiation service for the data warehouse
Nowadays, storing the information is fundamental for the correct functioning of any organization. The critical factor is to guarantee the security of the stored data. In the traditional database systems the security requirements are limited to confidentiality, integrity, availability of the data and user authorization. The criticality of the database system and data repositories for modern busi...
متن کاملExtending the data warehouse for service provisioning data
The last few years, there has been an extensive body of literature in data warehousing applications that primarily focuses on basket-type (transactional) data, common in retail industries. In this paper we focus on service provisioning data, that is data that is recorded internally in an organization for provisioning certain business related tasks. Coupling the recorded data with the underlying...
متن کاملIntroduction of a New Non-Repudiation Service to Protect Sensitive Private Data
Current security systems dealing with sensitive private data do not provide sufficient options to find data leaks. An approach to find the last authorized receiver of a protected copy is proposed in this paper. Existing security concepts are extended by a new security service based on reliable tracking data embedding. Additionally, a new mechanism to protect the new tracking data is shown. Digi...
متن کاملA Message Oriented Middleware Solution Enabling Non-repudiation Evidence Generation for Reliable Web Services
The paper describes an approach to providing reliable message passing together with mechanisms for enforcing non-repudiation for use by Web Services. In particular, we are concerned with message passing that occurs across organizational boundaries and evaluating the suitability of the Java Messaging Service in this approach.
متن کاملIntermediary Non-repudiation Protocols
In commercial transactions, an intermediary might be involved to help transacting parties to conduct their business. Nevertheless, the intermediary may not be fully trusted. In this paper, we introduce the concept of intermediary (or agent) in a non-repudiation protocol, define the aims of intermediary non-repudiation protocols, and analyze their security requirements. We present a simple scena...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Annales UMCS, Informatica
سال: 2010
ISSN: 2083-3628,1732-1360
DOI: 10.2478/v10065-010-0043-7