Security in Sap Hana

ثبت نشده
چکیده

No portion of this document may be reproduced in whole or in part without the prior written permission of Layer Seven Security. Layer Seven Security offers no specific guarantee regarding the accuracy or completeness of the information presented, but the professional staff of Layer Seven Security makes every reasonable effort to present the most reliabble information available to it and to meet or exceed any applicable industry standards. SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable for errors or omissions with respect to the materials. SAP Business ByDesign, and other SAP products and services mentioned herein are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius and other Business Objects products and services mentioned herein are trademarks or registered trademarks of Business Objects in the United States and/or other countries.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exporting Permissions to Hana: Declarative Approach

Jakub Sendor: is a research associate working in the Security & Trust research practice at SAP Labs France in Sophia-Antipolis. He is involved in the prototypes development initiatives around declarative authorization policies as well as working in A4Cloud (Accountability for Cloud) EU publicly funded project. His main interest comprise of cloud computing, dynamic programming languages and ente...

متن کامل

Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes

Cerberus is a tool to automatically synthesize run-time enforcement mechanisms for security-sensitive Business Processes (BPs). The tool is capable of guaranteeing that the execution constraints EC on the tasks together with the authorization policy AP and the authorization constraints AC are satisfied while ensuring that the process can successfully terminate. Cerberus can be easily integrated...

متن کامل

SAP HANA* Appliance - Efficient operation in a private cloud environment

SAP applications can often comprise the core of IT operations in large enterprises. Companies that outsource their SAP landscape and basic operation to a private cloud can manage their resources flexibly in a way that meets demand and saves costs. Dynamic Services for SAP Solutions* and Application Operations for SAP Solutions* form a private cloud solution from TSystems which comprises both th...

متن کامل

The SAP HANA Database -- An Architecture Overview

Requirements of enterprise applications have become much more demanding. They require the computation of complex reports on transactional data while thousands of users may read or update records of the same data. The goal of the SAP HANA database is the integration of transactional and analytical workload within the same database management system. To achieve this, a columnar engine exploits mo...

متن کامل

SAP HANA - From Relational OLAP Database to Big Data Infrastructure

SAP HANA started as one of the best-performing database engines for OLAP workloads strictly pursuing a main-memory centric architecture and exploiting hardware developments like large number of cores and main memories in the TByte range. Within this paper, we outline the steps from a traditional relational database engine to a Big Data infrastructure comprising different methods to handle data ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013