CFP last date
22 April 2024
Reseach Article

Security Policies in Modern Database System

Published on May 2012 by Nutan Sharma, Pooja Garg
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 11
May 2012
Authors: Nutan Sharma, Pooja Garg
c687d2b3-3673-4bdd-914e-e214e0745559

Nutan Sharma, Pooja Garg . Security Policies in Modern Database System. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 11 (May 2012), 16-20.

@article{
author = { Nutan Sharma, Pooja Garg },
title = { Security Policies in Modern Database System },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 11 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 16-20 },
numpages = 5,
url = { /proceedings/rtmc/number11/6701-1097/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Nutan Sharma
%A Pooja Garg
%T Security Policies in Modern Database System
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 11
%P 16-20
%D 2012
%I International Journal of Computer Applications
Abstract

Database security has become a vital issue in modern Web applications. Ensuring the confidentiality, privacy and integrity of data is a major issue for the security of database systems. Recent high profile data thefts have shown that perimeter defenses are insufficient to secure sensitive data. Securing organizations systems and data cannot be effective without the development of a written security policy. In this paper security policies and procedures for protection of databases, security features and classical threats are described.

References
  1. Protecting Database, white Paper, http;//www.appsecinc.com.
  2. Stephen KOST,'An introduction to SQL Injection Attacks for Oracle
  3. Loiraina Hazel "A overview of Oracle Database Security features",GSEC Practical Assignment,2001
  4. PAUL Carmichael Securing Database, GSEC Practical Assignment 2002.
  5. Anderson, D.2005,'HIPAA Security and Compliance." Published on www.tadan.com,July,2005.
  6. Security and integrity. Reading MA: Addison-Wesley.
  7. Mullinsc 2001.'Modern Database Administration, Part 1.-DM
  8. 2004CSI/FBI Computer Crime and Security Survery Http://www.Gocsi.Com
Index Terms

Computer Science
Information Sciences

Keywords

Database DBMS security protection smart card ATM swipe access cards assertions