The Challenges of Checking Integrity Constraints in Centralized, Distributed, and Parallel Databases

Author(s):  
Hamidah Ibrahim

A vital problem that should be tackled in today’s database system is guaranteeing database consistency. Many techniques and tools have been devised to fulfill this requirement in many interrelated research areas such as concurrency control, security control, reliability control, and integrity control (Eswaran & Chamberlin, 1975; Grefen, 1993). Concurrency control deals with the prevention of inconsistencies caused by concurrent access by multiple users or applications to a database. Security control deals with preventing users from accessing and modifying data in a database in unauthorized ways. Reliability control deals with the prevention of errors due to the malfunctioning of system hardware or software. Integrity control deals with the prevention of semantic errors made by users due to their carelessness or lack of knowledge. This chapter is concerned only with integrity control.

Author(s):  
YUN BAI ◽  
YAN ZHANG

In this paper, we propose a formal approach of Artificial Intelligence (AI) in securing object oriented database systems. We combine the specification of object oriented database with security policies and provide its formal syntax and semantics. The properties in the inheritance of authorizations in object oriented database system and reasoning about authorizations on data objects are also investigated in detail.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Muneeb -ul-Hasan ◽  
Siti Hajar Othman

Today, databases are on of the most important things in the IT world and it is also becoming more and more popular and organizations globally are gradually moving their traditional IT setup to database model to gain the benefits of securing the data and in terms of providing easy access to, and elasticity of IT services. With database security, the IT service roles within an organization become integrated hence giving the overall IT operating model a more structured layout. Such objectivity however can only be materialized when proper planning and execution are put in place. As such, a proper execution and implementation of database system would include a stringent set of checks and audit processes. The goal of database auditing is central towards determining if the services engaged and its―maintainers are meeting certain legal requirements in terms of protecting customers data and organization standards to achieve secure data assets success against various security threats. Therefore, this project explores the factors influencing security audit quality by collecting data using structured group discussion.


1996 ◽  
Vol 11 (3) ◽  
pp. 281-288 ◽  
Author(s):  
Luca Chittaro ◽  
Angelo Montanari

Time is one of the most relevant topics in AI. It plays a major role in several of AI research areas, ranging from logical foundations to applications of knowledge-based systems. Despite the ubiquity of time in AI, researchers tend to specialise and focus on time in particular contexts or applications, overlooking meaningful connections between different areas. In an attempt to promote crossfertilisation and reduce isolation, the Temporal Representation and Reasoning (TIME) workshop series was started in 1994. The third edition of the workshop was held on May 19–20 1996 in Key West, FL, with S. D. Goodwin and H. J. Hamilton as General Chairs, and L. Chittaro and A. Montanari as Program Chairs. A particular emphasis was given to the foundational aspects of temporal representation and reasoning through an investigation of the relationships between different approaches to temporal issues in AI, computer science and logic.


Author(s):  
Surya Pratap Singh ◽  
Arvind Kumar Maurya ◽  
Manish Mishra ◽  
Upendra Nath Tripathi

The data is the most valuable asset of any organization, it resides data in the database system that is used to store data of every running application. So the security of database is very important. One of the most widely used types of a database is Distributed Database which has the capabilities of both a relational database and distributed network architecture. Hence the security of database is of the prime concern and at the same time, it is very tough to ensure, because different types of attackers and hackers are trying everything to compromise the distributed database security. Various researches are done to preserve the distributed database security but some security problems are still unresolved. In this paper, we propose the use of Multi-scope based authentication and Enhanced Distributed firewall by which the integrity and security of distributed database can be achieved.


Sign in / Sign up

Export Citation Format

Share Document