scholarly journals Study on Database Management System Security Issues

2017 ◽  
Vol 1 (4-2) ◽  
pp. 192 ◽  
Author(s):  
Mohd Amin Mohd Yunus ◽  
Sonniaa K.V. Gopala Krishnan ◽  
Nazri Mohd Nawi ◽  
Ely Salwana Mat Surin

The study is about the security system of database management (DBMS) and proposed method. Information is an essential element in database management system where the users trust service providers will have a secure system to protect and prevent their information from malicious attack or stealing information. There are few types of technique applied to enhance the database security level.  

Author(s):  
Jaychand Vishwakarma ◽  
Abhishek Shukla

Nowadays a Database security has become an important issue in technical world. The main objective of database security is to forbid unnecessary information exposure and modification data while ensuring the availability of the needed services. A numbers of security methods have been created for protecting the databases. Many security models have been developed based on different security aspects of database. All of these security methods are useful only when the database management system is designed and developing for protecting the database. Recently the growth of web application with database at its backend Secure Database Management System is more essential than only a Secure Database. Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases.


2018 ◽  
Author(s):  
Doni winata

DONI WINATA_165100085_PBD_SYSTEM DEVELOPMENT AND DATABASE SECURITYBasic Data (Database) Basic data (English: database) is a collection of information stored on a computer systematically so that it can be used on a computer program to obtain information from the database. Software used to manage and release queries (databases) is called a management database system (database management system, DBMS).


Author(s):  
Janvi Desai

Abstract: Over the most recent decades, analysts and database service providers have fabricated devices to help DBAs (Database Administrators) in various parts of framework tuning and the actual design of the database. Most of this past work, regardless, is fragmented on the grounds that it expects people to come up with an official agreement or judgement about any modifications to the data in the database and fix issues after they happen rather than preventing such cases from taking place or adjusting to these changes automatically. What is required for a really "self-driving" database management system (DBMS) is another way of approaching this that is intended for independent activity and automatic decision making. This is different from prior endeavors since all angles of this framework are constrained by a coordinated arranging part that not just enhance the framework for the current responsibility, but in addition to this, it also predicts future responsibility that might take place and prepares itself for such not-so-common occurrences and adjusts to them as required while keeping the efficiency of the operations as close to normal as possible. With this, the DBMS can uphold all the past tuning procedures without requiring a human to decide the right way and proper opportunity to use them. It likewise empowers new advancements that are significant for current DBMSs (Database Management System), which are impractical today because of the fact that the intricacy of overseeing these frameworks has outperformed the abilities of human specialists who are supposed to tune them and make changes when required. Keywords: Database Management System, Database Administrator, Forecasting, Long Short-Term Memory, Recurrent Neural Networks


10.28945/2409 ◽  
2001 ◽  
Author(s):  
Leszek A. Maciaszek ◽  
Mieczyslaw L. Owoc

Information systems must be protected from unauthorized access. Authorization has been studied extensively as the main form ofpreserving the security of databases. Every database management system provides a sophisticated set of options aimed at protecting the database from unauthorized access. An important practical problem is how to take advantage of the database security options to ensure that a user is permitted to access the database through the application program but may not be allowed to access the database directly via database query tools. A related issue is how to extend the user privileges on the client part of the application so that only authorized GUI controls are available to the user. In this paper we propose a model for the design of necessary authorization settings into both the client and the server parts of a database application. The settings are stored in an Authorization Database (ADB) to which the program connects to customize itself for the current user. The customization is based on an application role granted to the user. An application role is activated for a connection (user session). After the database server authenticates the user, the user login to the application role can be transparently obtained by the application from the ADB.


2016 ◽  
Vol 4 (2-4) ◽  
pp. 199-207
Author(s):  
Shweta Malhotra ◽  
Mohammad Najmud Doja ◽  
Bashir Alam ◽  
Mansaf Alam

2019 ◽  
Author(s):  
Doni winata

Basic Data (Database) Basic data (English: database) is a collection of information stored on a computer systematically so that it can be used on a computer program to obtain information from the database. Software used to manage and release queries (databases) is called a management database system (database management system, DBMS).Computer system security in the Database is categorized in several aspects, namely: 1. Privacy / Confidentiality2. Integration3. Authentication4. Availability5. Nonrepudiation6. Access control


1996 ◽  
Vol 35 (01) ◽  
pp. 52-58 ◽  
Author(s):  
A. Mavromatis ◽  
N. Maglaveras ◽  
A. Tsikotis ◽  
G. Pangalos ◽  
V. Ambrosiadou ◽  
...  

AbstractAn object-oriented medical database management system is presented for a typical cardiologic center, facilitating epidemiological trials. Object-oriented analysis and design were used for the system design, offering advantages for the integrity and extendibility of medical information systems. The system was developed using object-oriented design and programming methodology, the C++ language and the Borland Paradox Relational Data Base Management System on an MS-Windows NT environment. Particular attention was paid to system compatibility, portability, the ease of use, and the suitable design of the patient record so as to support the decisions of medical personnel in cardiovascular centers. The system was designed to accept complex, heterogeneous, distributed data in various formats and from different kinds of examinations such as Holter, Doppler and electrocardiography.


1999 ◽  
Author(s):  
V.G. Ivensky ◽  
A. Olesen ◽  
T. May ◽  
L. Sroka ◽  
A. Pellegrino

1995 ◽  
Vol 32 (4) ◽  
pp. 677
Author(s):  
M J Shin ◽  
G W Kim ◽  
T J Chun ◽  
W H Ahn ◽  
S K Balk ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document