The Experts below are selected from a list of 29382 Experts worldwide ranked by ideXlab platform
Li Yang - One of the best experts on this subject based on the ideXlab platform.
-
teaching Database Security and auditing
Technical Symposium on Computer Science Education, 2009Co-Authors: Li YangAbstract:Hands-on laboratory experiences are essential critical for students to understand concepts and gain real-world insights in Database Security and auditing. We are developing a set of hands-on labs to integrate theories of Database Security into practices. Our designed labs do not require purchasing any commercial software or pre-configuration. Each lab includes objectives, results, and resources to help students to understand Database Security concepts including access control, virtual private Database, and Database auditing etc. We use two major Database products (Microsoft SQL Server and Oracle 10g) to design and implement our labs.
-
SIGCSE - Teaching Database Security and auditing
Proceedings of the 40th ACM technical symposium on Computer science education - SIGCSE '09, 2009Co-Authors: Li YangAbstract:Hands-on laboratory experiences are essential critical for students to understand concepts and gain real-world insights in Database Security and auditing. We are developing a set of hands-on labs to integrate theories of Database Security into practices. Our designed labs do not require purchasing any commercial software or pre-configuration. Each lab includes objectives, results, and resources to help students to understand Database Security concepts including access control, virtual private Database, and Database auditing etc. We use two major Database products (Microsoft SQL Server and Oracle 10g) to design and implement our labs.
Errol A. Blake - One of the best experts on this subject based on the ideXlab platform.
-
Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
Journal of Digital Forensics Security and Law, 2007Co-Authors: Errol A. BlakeAbstract:Database Security has evolved; data Security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to Database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure Databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS) selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent Database breach.
-
InfoSecCD - Network and Database Security: regulatory compliance, network, and Database Security--a unified process and goal
Proceedings of the 4th annual conference on Information security curriculum development - InfoSecCD '07, 2007Co-Authors: Errol A. BlakeAbstract:Database Security has evolved; data Security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to Database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure Databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS) selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent Database breach.
Zhang Yuqing - One of the best experts on this subject based on the ideXlab platform.
-
An Overview of Database Security
Computer Engineering, 2006Co-Authors: Zhang YuqingAbstract:Database technology is one of the most widely applied computer technologies,its Security is becoming more and more important.This paper starts from the definition of Database Security,discusses the problems of user authorization,access control,Security management and Database encryption.The main present domestic applications that improve the Security of Database through the method of revisions of Database are discussed in detail.At last,the existing problems of Database Security are proposed and the future research directions are also indicated.
Li Dong-feng - One of the best experts on this subject based on the ideXlab platform.
-
The Research and Realization of Database Security Technology
Computers & Security, 2008Co-Authors: Li Dong-fengAbstract:Database technology is one of the most widely applied computer technologies, its Security is becoming more and more important. This article elaborated the safe threat, the Database safe commonly used technology, the data Security transmission commonly used agreement and the Database Security engineering research tendency which the Database safe definition, the Database system faces, and the design realized the universities to practice the education management system management system Database Security technology plan.
Mario Guimaraes - One of the best experts on this subject based on the ideXlab platform.
-
InfoSecCD - Incorporating Database Security courseware into a Database Security class
Proceedings of the 4th annual conference on Information security curriculum development - InfoSecCD '07, 2007Co-Authors: Mario Guimaraes, Meg Murray, Richard AustinAbstract:Data Security is a growing concern and it seems timely to develop and incorporate Database Security courses into programs of study in the computing disciplines. This paper describes a recently developed course in Database Security and introduces a set of animations that might be incorporated to bring about more effective instruction and enhance student learning. Currently animations are being developed for referential integrity, integrity matrices, row level Security, SQL injections and inference problems. Animations related to encryption, multilevel Security and Database auditing procedures will be added in the future. The Database Security animations will be included as a module in an ongoing animated Database courseware project designed to provide supplementary instructional materials for the teaching of Database topics. Animations can be incorporated directly into classroom instruction or used independently by students to reinforce what they have learned or to deepen their understanding.
-
new challenges in teaching Database Security
Information Security Curriculum Development, 2006Co-Authors: Mario GuimaraesAbstract:Traditional Database Security has focused primarily on creating user accounts and managing user privileges to Database objects. The wide spread use of Databases over the web, heterogeneous client-server architectures, application servers, and networks creates an urgent need to widen this focus. This paper will provide an overview of the new and old Database Security challenges. Section one provides an overview of the Database Security concerns. It emphasizes Database Applications as the greatest concern and describes the SQL Slammer Worm, an example of not patching the Database Management System (DBMS) The second section explains in detail three Database topics: SQL injection [1], Multilevel Security [2] and Data Warehouse/Data Mining/Statistical Security. The reason for focusing on these topics is because they are new Database Security issues (at least not taught in traditional Database courses) and they are not topics that student will learn in any other course. The last topic provides guidelines for when to teach each Database Security topic and concludes by emphasizing the need for developing a Database Security Plan. Emphasis on a Database Security Plan resulted from interviewing Database Administrators and Security Specialists.
-
InfoSecCD - New challenges in teaching Database Security
Proceedings of the 3rd annual conference on Information security curriculum development - InfoSecCD '06, 2006Co-Authors: Mario GuimaraesAbstract:Traditional Database Security has focused primarily on creating user accounts and managing user privileges to Database objects. The wide spread use of Databases over the web, heterogeneous client-server architectures, application servers, and networks creates an urgent need to widen this focus. This paper will provide an overview of the new and old Database Security challenges. Section one provides an overview of the Database Security concerns. It emphasizes Database Applications as the greatest concern and describes the SQL Slammer Worm, an example of not patching the Database Management System (DBMS) The second section explains in detail three Database topics: SQL injection [1], Multilevel Security [2] and Data Warehouse/Data Mining/Statistical Security. The reason for focusing on these topics is because they are new Database Security issues (at least not taught in traditional Database courses) and they are not topics that student will learn in any other course. The last topic provides guidelines for when to teach each Database Security topic and concludes by emphasizing the need for developing a Database Security Plan. Emphasis on a Database Security Plan resulted from interviewing Database Administrators and Security Specialists.