Database Security

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 29382 Experts worldwide ranked by ideXlab platform

Li Yang - One of the best experts on this subject based on the ideXlab platform.

  • teaching Database Security and auditing
    Technical Symposium on Computer Science Education, 2009
    Co-Authors: Li Yang
    Abstract:

    Hands-on laboratory experiences are essential critical for students to understand concepts and gain real-world insights in Database Security and auditing. We are developing a set of hands-on labs to integrate theories of Database Security into practices. Our designed labs do not require purchasing any commercial software or pre-configuration. Each lab includes objectives, results, and resources to help students to understand Database Security concepts including access control, virtual private Database, and Database auditing etc. We use two major Database products (Microsoft SQL Server and Oracle 10g) to design and implement our labs.

  • SIGCSE - Teaching Database Security and auditing
    Proceedings of the 40th ACM technical symposium on Computer science education - SIGCSE '09, 2009
    Co-Authors: Li Yang
    Abstract:

    Hands-on laboratory experiences are essential critical for students to understand concepts and gain real-world insights in Database Security and auditing. We are developing a set of hands-on labs to integrate theories of Database Security into practices. Our designed labs do not require purchasing any commercial software or pre-configuration. Each lab includes objectives, results, and resources to help students to understand Database Security concepts including access control, virtual private Database, and Database auditing etc. We use two major Database products (Microsoft SQL Server and Oracle 10g) to design and implement our labs.

Errol A. Blake - One of the best experts on this subject based on the ideXlab platform.

  • Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
    Journal of Digital Forensics Security and Law, 2007
    Co-Authors: Errol A. Blake
    Abstract:

    Database Security has evolved; data Security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to Database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure Databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS) selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent Database breach.

  • InfoSecCD - Network and Database Security: regulatory compliance, network, and Database Security--a unified process and goal
    Proceedings of the 4th annual conference on Information security curriculum development - InfoSecCD '07, 2007
    Co-Authors: Errol A. Blake
    Abstract:

    Database Security has evolved; data Security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to Database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure Databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS) selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent Database breach.

Zhang Yuqing - One of the best experts on this subject based on the ideXlab platform.

  • An Overview of Database Security
    Computer Engineering, 2006
    Co-Authors: Zhang Yuqing
    Abstract:

    Database technology is one of the most widely applied computer technologies,its Security is becoming more and more important.This paper starts from the definition of Database Security,discusses the problems of user authorization,access control,Security management and Database encryption.The main present domestic applications that improve the Security of Database through the method of revisions of Database are discussed in detail.At last,the existing problems of Database Security are proposed and the future research directions are also indicated.

Li Dong-feng - One of the best experts on this subject based on the ideXlab platform.

  • The Research and Realization of Database Security Technology
    Computers & Security, 2008
    Co-Authors: Li Dong-feng
    Abstract:

    Database technology is one of the most widely applied computer technologies, its Security is becoming more and more important. This article elaborated the safe threat, the Database safe commonly used technology, the data Security transmission commonly used agreement and the Database Security engineering research tendency which the Database safe definition, the Database system faces, and the design realized the universities to practice the education management system management system Database Security technology plan.

Mario Guimaraes - One of the best experts on this subject based on the ideXlab platform.

  • InfoSecCD - Incorporating Database Security courseware into a Database Security class
    Proceedings of the 4th annual conference on Information security curriculum development - InfoSecCD '07, 2007
    Co-Authors: Mario Guimaraes, Meg Murray, Richard Austin
    Abstract:

    Data Security is a growing concern and it seems timely to develop and incorporate Database Security courses into programs of study in the computing disciplines. This paper describes a recently developed course in Database Security and introduces a set of animations that might be incorporated to bring about more effective instruction and enhance student learning. Currently animations are being developed for referential integrity, integrity matrices, row level Security, SQL injections and inference problems. Animations related to encryption, multilevel Security and Database auditing procedures will be added in the future. The Database Security animations will be included as a module in an ongoing animated Database courseware project designed to provide supplementary instructional materials for the teaching of Database topics. Animations can be incorporated directly into classroom instruction or used independently by students to reinforce what they have learned or to deepen their understanding.

  • new challenges in teaching Database Security
    Information Security Curriculum Development, 2006
    Co-Authors: Mario Guimaraes
    Abstract:

    Traditional Database Security has focused primarily on creating user accounts and managing user privileges to Database objects. The wide spread use of Databases over the web, heterogeneous client-server architectures, application servers, and networks creates an urgent need to widen this focus. This paper will provide an overview of the new and old Database Security challenges. Section one provides an overview of the Database Security concerns. It emphasizes Database Applications as the greatest concern and describes the SQL Slammer Worm, an example of not patching the Database Management System (DBMS) The second section explains in detail three Database topics: SQL injection [1], Multilevel Security [2] and Data Warehouse/Data Mining/Statistical Security. The reason for focusing on these topics is because they are new Database Security issues (at least not taught in traditional Database courses) and they are not topics that student will learn in any other course. The last topic provides guidelines for when to teach each Database Security topic and concludes by emphasizing the need for developing a Database Security Plan. Emphasis on a Database Security Plan resulted from interviewing Database Administrators and Security Specialists.

  • InfoSecCD - New challenges in teaching Database Security
    Proceedings of the 3rd annual conference on Information security curriculum development - InfoSecCD '06, 2006
    Co-Authors: Mario Guimaraes
    Abstract:

    Traditional Database Security has focused primarily on creating user accounts and managing user privileges to Database objects. The wide spread use of Databases over the web, heterogeneous client-server architectures, application servers, and networks creates an urgent need to widen this focus. This paper will provide an overview of the new and old Database Security challenges. Section one provides an overview of the Database Security concerns. It emphasizes Database Applications as the greatest concern and describes the SQL Slammer Worm, an example of not patching the Database Management System (DBMS) The second section explains in detail three Database topics: SQL injection [1], Multilevel Security [2] and Data Warehouse/Data Mining/Statistical Security. The reason for focusing on these topics is because they are new Database Security issues (at least not taught in traditional Database courses) and they are not topics that student will learn in any other course. The last topic provides guidelines for when to teach each Database Security topic and concludes by emphasizing the need for developing a Database Security Plan. Emphasis on a Database Security Plan resulted from interviewing Database Administrators and Security Specialists.