scispace - formally typeset
Book ChapterDOI

Legitimate Privilege Abuse and Data Security in Database

TLDR
This paper delineates database security utilizing true blue benefit manhandle and cryptography to portray thetrue blue benefit abuse in the database.
Abstract
Data is fundamental in today’s digital life. Therefore, the essential need is to protect data from unauthorized users. Choosing a database application depends on cost. Business database is expensive to a great degree. This paper delineates database security utilizing true blue benefit manhandle and cryptography. There are numerous dangers in the database, which releases the data for the denied purpose. Among the fundamental dangers in database security, this paper will portray the true blue benefit abuse. Among the approaches to secure data from gatecrashers/assailants is by using cryptography techniques, the access-control approach is the primary imperative technique to secure database by using cryptography and row-level security.

read more

Citations
More filters
Journal ArticleDOI

A Recent Survey on Internet of Things (IoT) Communication Protocols

TL;DR: Various communication protocols, namely Zigbee, Bluetooth, Near Field Communication (NFC), LoRA, etc. are presented, and the difference between different communication protocols is provided.
Book ChapterDOI

A Secure DBA Management System: A Comprehensive Study

TL;DR: In this paper , the authors present various security aspects of the DB administrator (DB) management system and give an analysis of various security threats of the last two decades in social information bases.
References
More filters
Journal ArticleDOI

Database security - concepts, approaches, and challenges

TL;DR: The most relevant concepts underlying the notion of database security are surveyed and the most well-known techniques are summarized, and access control systems are described, namely, the discretionary and mandatory access control models, and the role-based access control (RBAC) model.
Journal ArticleDOI

Database security: research and practice

TL;DR: The state of the art in access control for database systems is surveyed, the main research issues are discussed, and possible directions for future research are outlined.
Journal ArticleDOI

Database Security and Encryption: A Survey Study

TL;DR: This survey was conducted to identify the issues and threats in database security, requirements ofdatabase security, and how encryption is used at different levels to provide the security.
Proceedings ArticleDOI

The role of cryptography in database security

TL;DR: This extended abstract addresses the problem of defining and achieving security in a context where the database is not fully trusted, i.e., when the users must be protected against a potentially malicious database.

Database Security: Threats and Challenges

TL;DR: The challenges and threats in database security are identified and the ways a database can be compromised are identified.