{"title":"Towards an End-User Layer for Data Integrity","authors":"Lu'ay Abu Rayyan, Hakim Hacid, Andrew Leoncé","doi":"10.1145/3350546.3352538","DOIUrl":null,"url":null,"abstract":"Data Integrity (DI) is the ability to ensure that a data retrieved from a database is the same as that stored and processed. It is a major component of data security and has an important role for the quality of decision making. While most of the existing approaches rely on a reinforcement of security mechanisms, e.g., access control or cryptography techniques, to ensure a high data integrity quality, we follow an end-user perspective to this end to complement the security approach. Simple, yet powerful, the proposed approach is promising in the inclusion of the end-user into the complex problem of DI. CCS CONCEPTS • Information systems → Integrity checking; Database utilities and tools; • Security and privacy → Database activity monitoring; Information accountability and usage control.","PeriodicalId":171168,"journal":{"name":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE/WIC/ACM International Conference on Web Intelligence (WI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3350546.3352538","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Data Integrity (DI) is the ability to ensure that a data retrieved from a database is the same as that stored and processed. It is a major component of data security and has an important role for the quality of decision making. While most of the existing approaches rely on a reinforcement of security mechanisms, e.g., access control or cryptography techniques, to ensure a high data integrity quality, we follow an end-user perspective to this end to complement the security approach. Simple, yet powerful, the proposed approach is promising in the inclusion of the end-user into the complex problem of DI. CCS CONCEPTS • Information systems → Integrity checking; Database utilities and tools; • Security and privacy → Database activity monitoring; Information accountability and usage control.