Return to Article Details ANALYSING SENSITIVE DATA SECURITY USING TOKENIZATION-BASED DATA MASKING IN THE EXTRACT-TRANSFORM-LOAD (ETL) PROCESS Download Download PDF