Академический Документы
Профессиональный Документы
Культура Документы
Violating only single repository’s data security could expose all data
o Avoiding central warehouses and using distributed data mining algorithms minimize the exchange of
data needed to develop globally valid model
o Complicated due to its multidisciplinary nature and the issues related to the subjectivity in the
interpretation of privacy, trust and so on
DATA QUALITY
to ensure supporting the maintenance of quality data the database community could benefit from seal of quality
stamps posted on Web sites, more effective integrity semantics verification tools for data assessment based on
techniques such as record linkage, perhaps even more efficient application level recovery techniques.
DATA SURVIVABILITY
Database systems need to operate and continue their function, even with reduced capabilities, despite
disruptive events from warfare attack
DBMS should be able to do the following:
o Confinement
Take immediate action to eliminate the attacker’s access
Isolate and contain the problem from further spread
o Damage assessment
Determine the extent of the problem, including failed functions and corrupted data
o Reconfiguration
o Repair
Recover corrupted or lost data and repair or reinstall failed system functions to reestablish a
normal level of operations
o Fault treatment
To the extent possible, identify the weaknesses exploited in the attack and take steps to prevent
a recurrence