Relational Data Leakage Detection Using Fake Object and Allocation Strategies

Download Now
Provided by: International Journal of Computer Applications
Topic: Data Management
Format: PDF
In today's world, there is need of many companies to outsource their sure business processes (e.g. marketing, human resources) and related activities to a third party like their service suppliers. In many cases the service supplier desires access to the company's confidential information like customer data, bank details to hold out their services. And for most corporations the amount of sensitive data used by outsourcing providers continues to increase. So in today's condition data leakage is a worldwide common risks and mistakes and preventing data leakage is a business-wide challenge.
Download Now

Find By Topic