Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

[책][B] Database systems: design, implementation and management

C Coronel, S Morris - 2019 - thuvienso.hoasen.edu.vn
Database Systems: Design, Implementation, & Management, 13th ed. Page 1 DATABASE
SYSTEMS Carlos Coronel | Steven Morris Design, Implementation, and Management 13e …

Continuous auditing of database applications: An embedded audit module approach

SM Groomer, US Murthy - Continuous Auditing: Theory and …, 2018 - emerald.com
This paper demonstrates an approach to address the unique control and security concerns
in database environments by using audit modules embedded into application programs …

[인용][C] Testing Computer Software

C Kaner - 1999 - books.google.com
Dies ist die 2. Auflage eines herausragenden und äußerst erfolgreichen Softwaretitels, der
auch von Amazon besonders empfohlen wird. Früher herausgegeben von VNR Computer …

Database encryption: an overview of contemporary challenges and design considerations

E Shmueli, R Vaisenberg, Y Elovici, C Glezer - ACM SIGMOD Record, 2010 - dl.acm.org
This article describes the major challenges and design considerations pertaining to
database encryption. The article first presents an attack model and the main relevant …

[책][B] Security patterns in practice: designing secure architectures using software patterns

E Fernandez-Buglioni - 2013 - books.google.com
Learn to combine security theory and code to produce secure systems Security is clearly a
crucial issue to consider during the design and implementation of any distributed software …

[책][B] Essentials of systems analysis and design

JS Valacich, JF George, JA Hoffer - 2015 - thuvienso.hoasen.edu.vn
This briefer version of the authors' highly successful Modern System Analysis and Design is
a clear presentation of information, organised around the systems development life cycle …

[PDF][PDF] Access control for collaborative environments

HH Shen, P Dewan - Proceedings of the 1992 ACM conference on …, 1992 - dl.acm.org
Access control is an indispensable part of any information sharing system. Collaborative
environments introduce new requirements for accesscontrol, which cannot be met by using …

A model of authorization for next-generation database systems

F Rabitti, E Bertino, W Kim, D Woelk - ACM Transactions on Database …, 1991 - dl.acm.org
The conventional models of authorization have been designed for database systems
supporting the hierarchical, network, and relational models of data. However, these models …

Enhancing access to microdata while protecting confidentiality: Prospects for the future

GT Duncan, RW Pearson - Statistical Science, 1991 - projecteuclid.org
This article presents a scenario for the future of research access to federally collected
microdata. Many researchers find access to government databases increasingly desirable …