[1] Paul P, Aithal PS. Database security: An overview and analysis of current trend. International Journal of Management, Technology, and Social Sciences (IJMTS). 2019 Oct 30;4(2):53-8.
[2] Omotunde H, Ahmed M. A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of CyberSecurity. 2023 Aug 7;2023:115-33.
[3] Teimoor RA. A review of database security concepts, risks, and problems. UHD Journal of Science and Technology. 2021 Oct 10;5(2):38-46.
[4] Kothari H, Suwalka AK, Kumar D. Various database attacks, approaches and countermeasures to database security. International Journal of Advance Research in Computer Science and Management. 2019;5(4):357-62.
[5] Samaraweera GD, Chang JM. Security and privacy implications on database systems in Big Data era: A survey. IEEE Transactions on Knowledge and Data Engineering. 2019 Jul 18;33(1):239-58.
[6] Santos RJ, Bernardino J, Vieira M. A survey on data security in data warehousing: Issues, challenges and opportunities. In2011 IEEE EUROCON-International Conference on Computer as a Tool 2011 Apr 27 (pp. 1-4). IEEE.
[7] Pan B, Stakhanova N, Ray S. Data provenance in security and privacy. ACM Computing Surveys. 2023.
[8] Ray S, Mishra KN, Dutta S. Big data security issues from the perspective of IoT and cloud computing: A review. Recent Advances in Computer Science and Communications. 2020;12(1):1-22.
[9] Diaz C. Database Security: Problems and Solutions. Stylus Publishing, LLC; 2022 Jul 28.
[10] Sagiroglu S, Sinanc D. Big data: A review. In2013 international conference on collaboration technologies and systems (CTS) 2013 May 20 (pp. 42-47). IEEE.
[11] Kaushik M, Jain A. Challenges to big data security and privacy. International Journal of Computer Science and Information Technologies (IJCSIT). 2014;5(3):3042-3.
[12] Krishnan K. Data warehousing in the age of big data. Newnes; 2013 May 2.
[13] Cardenas AA, Manadhata PK, Rajan SP. Big data analytics for security. IEEE Security & Privacy. 2013 Dec 12;11(6):74-6.
[14] Venkatraman S, Venkatraman R. Big data security challenges and strategies. AIMS Mathematics. 2019 Jan 1;4(3):860-79.
[15] Tiwari AK, Chaudhary H, Yadav S. A review on Big Data and its security. In2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) 2015 Mar 19 (pp. 1-5). IEEE.
[16] Alguliyev R, Imamverdiyev Y. Big data: Big promises for information security. In2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT) 2014 Oct 15 (pp. 1-4). IEEE.
[17] Cuzzocrea A, Bellatreche L, Song IY. Data warehousing and OLAP over big data: current challenges and future research directions. InProceedings of the sixteenth international workshop on Data warehousing and OLAP 2013 Oct 28 (pp. 67-70).
[18] Jain P, Gyanchandani M, Khare N. Big data privacy: a technological perspective and review. Journal of Big Data. 2016 Dec;3:1-25.
[19] Altıntaş B. A security comparison of Oracle, SQL Server and MySQL database management systems against SQL injection attack vulnerabilities.
[20] Rjaibi W, Hammoudeh M. Enhancing and simplifying data security and privacy for multitiered applications. Journal of Parallel and Distributed Computing. 2020 May 1;139:53-64.
[21] Gedam MN, Meshram BB. DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE.
[22] Pamulaparty L, Kumar TP, Varma PV. A Survey: Security Perspectives of ORACLE and IBM-DB2 Databases. International Journal of Scientific and Research Publications. 2013 Jan;3(1).
[23] Nguyễn ĐL. Database security in the cloud: Survey and deployment of oracle database security in the Amazon cloud.
[24] Kaleem M, Shi W. Demystifying pythia: A survey of chainlink oracles usage on ethereum. InFinancial Cryptography and Data Security. FC 2021 International Workshops: CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers 25 2021 (pp. 115-123). Springer Berlin Heidelberg.