Database security is a discipline that seeks to protect data stored into a DBMS from intrusions, improper modifications, theft, and unauthorized disclosures. This is realized through a set of security services, which meet the security requirements of both the system and the data sources. Security services are implemented through particular processes, which are called security mechanisms.
Access control. In the 1970s, as part of the research on System R at IBM Almaden Research Center, there was a lot of work on access control for relational DBMSs . About the same time, some early work on Multilevel Secure Database Management Systems (MLS/DBMSs) was reported, whereas much of the development on...
- 1.Air Force Studies Board and Committee on Multilevel data management security. Multilevel data management security. Washington, DC: National Academy; 1983.Google Scholar
- 3.Bertino E, Laggieri D, Terzi E. Securing DBMS: characterizing and detecting query flood. In: Proceedings of the 9th Information Security Conference; 2004. p. 195–206.Google Scholar
- 4.Brainard J, Juels A, Rivest RL, Szydlo M, Yung M. Fourth-factor authentication: somebody you know. In: Proceedings of the 13th ACM Conference on Computer and Communications Security; 2006.Google Scholar
- 6.Castano S, Fugini MG, Martella G, Samarati P. Database security. Reading: Addison-Wesley; 1995.Google Scholar
- 8.Damiani ML, Bertino E. Access control systems for geo-spatial data and applications. In: Belussi A, Catania B, Clementini E, Ferrari E, editors. Modelling and management of geographical data over distributed architectures. Springer; 2007. p. 189–214.Google Scholar
- 10.Ferrari E, Thuraisingham BM. Secure database systems. In: Diaz O, Piattini M, editors. Advanced databases: technology and design. London: Artech House; 2000.Google Scholar
- 11.Grandison T, LeFevre K. Hippocratic database. In: Encyclopedia of cryptography and security. 2nd ed. Springer; 2010.Google Scholar
- 12.Orso A. SQL injection attacks. Encyclopedia of cryptography and security. Springer; 2011.Google Scholar