[1] Al-Sayid NA, Aldlaeen D. Database security threats: A survey study. In2013 5th international conference on computer science and information technology 2013 Mar 27 (pp. 60-64). IEEE.
[2] Chica JC, Imbachi JC, Vega JF. Security in SDN: A comprehensive survey. Journal of Network and Computer Applications. 2020 Jun 1;159:102595.
[3] Uzunov AV, Fernandez EB, Falkner K. Securing distributed systems using patterns: A survey. Computers & Security. 2012 Jul 1;31(5):681-703.
[4] Uzunov AV. A survey of security solutions for distributed publish/subscribe systems. Computers & Security. 2016 Aug 1;61:94-129.
[5] Tan YS, Ko RK, Holmes G. Security and data accountability in distributed systems: A provenance survey. In2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing 2013 Nov 13 (pp. 1571-1578). IEEE.
[6] Santos, R.J., Bernardino, J. and Vieira, M., 2011, April. A survey on data security in data warehousing: Issues, challenges and opportunities. In 2011 IEEE EUROCON-International Conference on Computer as a Tool (pp. 1-4). IEEE.
[7] Gupta N, Agrawal R. Challenges and security issues of distributed databases. InNoSQL 2017 May 19 (pp. 251-270). Chapman and Hall/CRC.
[8] Benantar M. Access control systems: security, identity management and trust models. Springer Science & Business Media; 2005 Dec 9.
[9] Colombo P, Ferrari E. Privacy aware access control for big data: A research roadmap. Big Data Research. 2015 Dec 1;2(4):145-54.
[10] Bertino E, Ferrari E. Big data security and privacy. InA comprehensive guide through the Italian database research over the last 25 years 2017 May 31 (pp. 425-439). Cham: Springer International Publishing.
[11] Metoui N, Bezzi M, Armando A. Risk-based privacy-aware access control for threat detection systems. Transactions on Large-Scale Data-and Knowledge-Centered Systems XXXVI: Special Issue on Data and Security Engineering. 2017:1-30.
[12] Abouelmehdi K, Beni-Hssane A, Khaloufi H, Saadi M. Big data security and privacy in healthcare: A Review. Procedia Computer Science. 2017 Jan 1;113:73-80.
[13] Paananen H, Lapke M, Siponen M. State of the art in information security policy development. Computers & Security. 2020 Jan 1;88:101608.
[14] Dekker MA, Etalle S. Audit-based access control for electronic health records. Electronic notes in theoretical computer science. 2007 Feb 8;168:221-36.
[15] Inukollu VN, Arsi S, Ravuri SR. Security issues associated with big data in cloud computing. International Journal of Network Security & Its Applications. 2014 May 3;6(3):45.
[16] McCollum CJ, Messing JR, Notargiacomo L. Beyond the pale of MAC and DAC--Defining new forms of access control. InProceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy 1990 May 1 (pp. 190-190). IEEE Computer Society.
[17] Kulkarni S, Urolagin S. Review of attacks on databases and database security techniques. International Journal of Emerging Technology and Advanced Engineering. 2012 Nov;2(11):253-63.
[18] Curtis LH, Weiner MG, Boudreau DM, Cooper WO, Daniel GW, Nair VP, Raebel MA, Beaulieu NU, Rosofsky R, Woodworth TS, Brown JS. Design considerations, architecture, and use of the Mini‐Sentinel distributed data system. Pharmacoepidemiology and drug safety. 2012 Jan;21:23-31.
[19] Mazurek ML, Arsenault JP, Bresee J, Gupta N, Ion I, Johns C, Lee D, Liang Y, Olsen J, Salmon B, Shay R. Access control for home data sharing: Attitudes, needs and practices. InProceedings of the SIGCHI Conference on Human Factors in Computing Systems 2010 Apr 10 (pp. 645-654).
[20] Ryutov T, Zhou L, Neuman C, Leithead T, Seamons KE. Adaptive trust negotiation and access control. InProceedings of the tenth ACM symposium on Access control models and technologies 2005 Jun 1 (pp. 139-146).
[21] Ullah F, Edwards M, Ramdhany R, Chitchyan R, Babar MA, Rashid A. Data exfiltration: A review of external attack vectors and countermeasures. Journal of Network and Computer Applications. 2018 Jan 1;101:18-54.
[22] Panda BN. Query processing in multilevel secure database systems. North Dakota State University; 1993.
[23] Sharma PK, Singh S, Jeong YS, Park JH. Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks. IEEE Communications Magazine. 2017 Sep 8;55(9):78-85