Review
References
Alliance CS (2020). Top threats to cloud computing Egregious eleven deep dive. Cloud Security Alliance 1(0). |
|
Date JC (2004). Une introduction aux systèmes de bases de données. Boston: Pearson/Addison Wesley. |
|
Deepika SN (2015). Database security Threats and security techniques. International Journal of Information Sciences and Techniques, 5. |
|
Kumar V, Chaisiri S, Ko R (2017a). A data-centric view of cloud security. In Data Security in Cloud Computing. Institution of Engineering and Technology pp. 1-17. |
|
Kumar V, Chaisiri S, Ko R (2017b). Data Security in Cloud Computing. Institution of Engineering and Technology. |
|
MongoDB. Client-side field level encryption guide. |
|
Mè L (2006). Sécurité des systèmes information. |
|
Powell D, Stroud R (2003). Conceptual model and architecture of maftia. Technical Report Series-University of Newcastle upon Tyne Computing Science. |
Copyright © 2024 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0