Book ChapterDOI
Legitimate Privilege Abuse and Data Security in Database
S. Aravindharamanan,Somula Ramasubbareddy,K. Govinda +2 more
- pp 175-181
TLDR
This paper delineates database security utilizing true blue benefit manhandle and cryptography to portray thetrue blue benefit abuse in the database.Abstract:
Data is fundamental in today’s digital life. Therefore, the essential need is to protect data from unauthorized users. Choosing a database application depends on cost. Business database is expensive to a great degree. This paper delineates database security utilizing true blue benefit manhandle and cryptography. There are numerous dangers in the database, which releases the data for the denied purpose. Among the fundamental dangers in database security, this paper will portray the true blue benefit abuse. Among the approaches to secure data from gatecrashers/assailants is by using cryptography techniques, the access-control approach is the primary imperative technique to secure database by using cryptography and row-level security.read more
Citations
More filters
Journal ArticleDOI
A Recent Survey on Internet of Things (IoT) Communication Protocols
TL;DR: Various communication protocols, namely Zigbee, Bluetooth, Near Field Communication (NFC), LoRA, etc. are presented, and the difference between different communication protocols is provided.
Book ChapterDOI
A Secure DBA Management System: A Comprehensive Study
TL;DR: In this paper , the authors present various security aspects of the DB administrator (DB) management system and give an analysis of various security threats of the last two decades in social information bases.
References
More filters
Journal ArticleDOI
Database security - concepts, approaches, and challenges
Elisa Bertino,Ravi Sandhu +1 more
TL;DR: The most relevant concepts underlying the notion of database security are surveyed and the most well-known techniques are summarized, and access control systems are described, namely, the discretionary and mandatory access control models, and the role-based access control (RBAC) model.
Journal ArticleDOI
Database security: research and practice
TL;DR: The state of the art in access control for database systems is surveyed, the main research issues are discussed, and possible directions for future research are outlined.
Journal ArticleDOI
Database Security and Encryption: A Survey Study
TL;DR: This survey was conducted to identify the issues and threats in database security, requirements ofdatabase security, and how encryption is used at different levels to provide the security.
Proceedings ArticleDOI
The role of cryptography in database security
TL;DR: This extended abstract addresses the problem of defining and achieving security in a context where the database is not fully trusted, i.e., when the users must be protected against a potentially malicious database.
Database Security: Threats and Challenges
TL;DR: The challenges and threats in database security are identified and the ways a database can be compromised are identified.