Development of a stored procedure debugger for MYSQL V5.x

Author(s):  
Walther Alfredo Figueroa Tejada ◽  
Danilo Omar Mejía Murcia ◽  
Francisco Daniel Chafoya Castro
Keyword(s):  
2013 ◽  
Vol 336-338 ◽  
pp. 1953-1956
Author(s):  
Qi Ming Lou ◽  
Ying Fang Li ◽  
Hong Wei Zhang

Computer room is an important infrastructure of information technology on education for colleges, how to balance the load, calculate fees flexibly, improve resource utilization, service for the teachers and students better is an urgent problem.Firstly, the development trends of computer room management systems are discussed in the paper. Secondly, gives a data model of open computer room management system, which in order to balance the load and improve the utilization efficiency etc. of computer rooms. Finally, gives the intelligent billing algorithm according to the designed data model, and then implemented the algorithm using stored procedure with SQL Server 2005.


SQL ◽  
2019 ◽  
pp. 331-358
Author(s):  
Ralf Adams
Keyword(s):  

2014 ◽  
Vol 519-520 ◽  
pp. 17-20
Author(s):  
Rui Wang ◽  
Na Wang
Keyword(s):  

In this paper, it mainly introduces how to realize the stored procedure of the bank CRM with PL/SQL in ORACLE, and the related technologies in the process.


India, the biggest democratic ruling system in terms of population utilises the Electronic Voting Machine or EVM for their general elections. Any EVM comprises of two units: The Control unit and the Ballot unit. O n g o i n g re s e a rc h h a s i n d i c a t e d m a n y disadvantages in the system. One of the main disadvantages we encounter is that many researchers have claimed that the EVM can easily be tampered with. EVMs also encounter many physical threats. To prevent these drawbacks, we have proposed an online voting s y s t e m w h i c h c o u n t e r m a n y p h y s i c a l difficulties faced by the EVM. One main difficulty in the online system is the SQL Injection attack. SQL injection is messing with the database and controlling it with the help of SQL Queries. Our project focuses on the Tautology based SQL Injection attack. In this attack, a statement whose value will always be true or 1 is passed instead of username and password by the hacker. This allows access to t h e d a t a b a s e w h i c h a l l o w s h i m / h e r t o manipulate it. Manipulation can be of several kinds. Web based Voting is another innovation that is rising which has the possibility of countering numerous downsides looked by the EVMs. The online voting application works as any other web application. Each voter who wants to vote needs to fill all the required details and create an account on the website first. On the day of voting, when voters cast their vote, they need to sign in with their respective credentials. When the credentials match with the data from database, the voter can get to the voting page and make his choice. An affirmation mail is the sent to the client after effectively making the choice. The votes cast by the voters are sent to a separate database which is viewed in the administration s i d e . We u s e s t o r e d p r o c e d u r e s a n d parameterized queries to prevent the Tautology based SQL attack. If a malicious user enters any query which has a value, it will simply be passed as a parameter to the SQL statement and wont be a component of the SQL statement itself, thus rendering the stored procedure invulnerable to SQL injection attacks. We also use the Secure Hash Algorithm 256 (SHA-256). It is a type of cryptographic hash function which generates a unique 256 bit long hash key for each vote. It is a one way function and so it cannot be decrypted. This ensures that the votes are not manipulated.


Sign in / Sign up

Export Citation Format

Share Document