Preview

Database Security

Powerful Essays
Open Document
Open Document
28580 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Database Security
- 1 -
Database Security *)
GÜNTHER PERNUL
Institut für Angewandte Informatik und Informationssysteme
Abteilung für Information Engineering
Universität Wien
Vienna, Austria
1. Introduction
1.1 The Relational Data Model Revisited
1.2 The Vocabulary of Security and Major DB Security Threats
2. Database Security Models
2.1 Discretionary Security Models
2.2 Mandatory Security Models
2.3 Adapted Mandatory Access Control Model
2.4 Personal Knowledge Approach
2.5 Clark and Wilson Model
2.6 A Final Note on Database Security Models
3. Multilevel Secure Prototypes and Systems
3.1 SeaView
3.2 Lock Data Views
3.3 ASD_Views
4. Conceptual Data Model for Multilevel Security
4.1 Concepts of Security Semantics
4.2 Classification Constraints
4.3 Consistency and Conflict Management
4.4 Modeling the Example Application
5. Standardization and Evaluation Efforts
6. Future Directions in Database Security Research
7. Conclusions
References
1. Introduction
Information stored in databases is often considered as a valuable and important corporate resource. Many organizations have become so dependent on the proper functioning of their systems that a disruption of service or a leakage of stored information may cause outcomes ranging from inconvenience to catastrophe. Corporate data may relate to financial records, others may be essential for the successful operation of an organization, may represent trade
*) Advances in Computers, Vol. 38. M. C. Yovits (Ed.), Academic Press, 1994, pp. 1 - 74.
- 2 - secrets, or may describe information about persons whose privacy must be protected. Thus, the general concept of database security is very broad and entails such things as moral and ethical issues imposed by public and society, legal issues where control is legislated over the collection and disclosure of stored information, or more technical issues such as how to protect the stored information from loss or unauthorized access, destruction, use,



References: concepts consult the surveys by Jajodia and Sandhu (1990a), Lunt and Fernandez (1990), or Denning (1988) consult the annotated bibliography by Pernul and Luef (1992).

You May Also Find These Documents Helpful

  • Good Essays

    Database administrators should monitor their SQL databases for unauthorized or abnormal SQL injections and write scripts for alarming as well as Simple Network Management Protocol (SNMP) alerts. Additional safeguards can be placed that include encrypting the data elements that reside in long-term storage of the SQL…

    • 575 Words
    • 3 Pages
    Good Essays
  • Good Essays

    • Describe the basic framework or make-up of any database. Discuss what makes databases important as well as a major target to hackers.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Database Design

    • 1196 Words
    • 5 Pages

    “A database is a structured collection of records or data that is stored in a computer system. In order for a database to be truly functional, it must not only store large amounts of record, but also be able to access those records fast and efficiently. In addition, new information and changes should also be easy to input.” (tech-faq.com) To be useful over a long term the database should be able to store all the records necessary for the business to function as well as be able to get all of this information back in case of a system failure or a crash. If all the information is loss a business could go bankrupt so the database is a fail safe for all the information the company has.…

    • 1196 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Database Environment

    • 1121 Words
    • 5 Pages

    A database defines a structure for storing information and it collects information that is organized in such a way that a computer program can quickly select desired pieces of data. A database can also be thought of as an electronic filing system. Data and information are extracted from a database by creating a query and then submitting it to the query database management system (DBMS) and it is posed in a language that only the DBMS can understand. The query can be in the form of a question or just a keyword and once these queries run against the database, it will find a matching record (Reynolds, 2004) .…

    • 1121 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Application Layer Security

    • 3346 Words
    • 14 Pages

    Abstract Acknowledgement Background Introduction Design Vulnerabilities Development Vulnerabilities Deployment Vulnerabilities Conclusion Appendix A (OSI Model) Appendix B (SQL Injection) Appendix C (Top 10 Security Flaws) References Page 1 Page 1 Page 1 Page 2 Page 2 Page 4 Page 5 Page 5 Page 6 Page 7 Page 8 Page 9…

    • 3346 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    Database Design

    • 149940 Words
    • 600 Pages

    retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information…

    • 149940 Words
    • 600 Pages
    Satisfactory Essays
  • Powerful Essays

    This

    • 56113 Words
    • 225 Pages

    I hope that most of the questions in this book deserve an answer. The set of questions…

    • 56113 Words
    • 225 Pages
    Powerful Essays
  • Powerful Essays

    Keywords Database Security Database, Security, Encryption, Access Control. 1. INTRODUCTION We ask that authors follow some simple guidelines.…

    • 3977 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    DATABASE SPECIFICATIONS

    • 722 Words
    • 4 Pages

    DATABASE SPECIFICATIONS 1. TABLE NAME : TBLGENDER FIELD NAME DATA TYPE SIZE CONSTRAINT REFERENCES GID IntN/A PK, IDENTITY NONE GDESC Varchar6 NOT NULL NONE 2. TABLE NAME: TBLGRDLVL FIELD NAME DATA TYPE SIZE CONSTRAINT REFERENCES GRDID IntN /…

    • 722 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Database Design

    • 739 Words
    • 3 Pages

    Database Design Process Database Life Cycle Key points Database design must reflect the information system of which the database is a part Information systems undergo evaluation and revision within a framework known as the Systems Development Life Cycle (SDLC) Databases also undergo evaluation and revision within a framework known as the Database Life Cycle (DBLC) There are two general design strategies exist: top-down vs. bottom-up design centralized vs. decentralized design 2 The Information System Database Carefully designed and constructed repository of facts Part of an information system Information System Provides data collection, storage, and retrieval Facilitates data transformation Includes people, procedures, hardware, and software 3 The Information System (Con’t.)…

    • 739 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Database Ralationship

    • 7781 Words
    • 32 Pages

    Avirup Sil∗ Temple University Philadelphia, PA avi@temple.edu Yinfei Yang St. Joseph’s University Philadelphia, PA yangyin7@gmail.com Abstract…

    • 7781 Words
    • 32 Pages
    Good Essays
  • Satisfactory Essays

    System security for user

    • 499 Words
    • 2 Pages

    1. Always use a strong password with a combination of alphabets, numbers and special characters…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Database Organization

    • 691 Words
    • 3 Pages

    Here at the College of Veterinary Medicine, the databases that I have used are Microsoft SQLServer, Microsoft Access, and ProISAM. ProISAM is the type of database that Vetstar (our Hospital system) uses. It is the proprietary database for the PROIV programming environment that Vetstar is written in. The main problem with this database is that it is not ODBC compatible which just means that you cannot connect to it and query it directly with other programming languages such as Visual Basic. ODBC which stands for open database connectivity, is an industry standard for connecting to databases. We are planning to move the Vetstar database to a PostgreSQL database sometime in the next year. This will be ODBC compatible. Meanwhile we are now copying Vetstar tables to text and then loading them into a SQLServer database in order to be able to do the ad hoc queries that are needed. Other databases we maintain on SQLServer are the Personnel database which keeps track of employee information which, by the way, is the source for the college directory for CVM on our Web page and for the picture directory that is published each fall among other things; the Student Services databases which hold all of the information about our students ( personal, student schedules, grades, Web Admissions to the college); the Medical Records database which holds all of the abstract information for procedures and diagnosis pertaining to animal visits. We also have a SQLServer database which holds all of the archived data from VSI which is the hospital system we had before Vetstar.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Better Essays

    System Security

    • 1174 Words
    • 5 Pages

    a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.…

    • 1174 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Database Questions

    • 418 Words
    • 2 Pages

    EXAM QUESTIONS 1. Give 2-3 examples of the database applications. 2. What is the role of the database in the IS generic architecture? 3.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays