Research and Application of Web Database Security Technology

2013 ◽  
Vol 380-384 ◽  
pp. 2306-2311
Author(s):  
Lin Na Huang

With the wide application of Web technology, Web database system is playing an increasingly important role in network application. The storage amount of Web database information is growing, at the same time, the security of Web database has been facing extremely daunting challenges. How to strengthen the security of Web database system has become an important issue of network researches. This paper has introduced implementation techniques of database security, described the sub-key encryption algorithm of database in details, and applied it to the management system of information student.

2018 ◽  
Author(s):  
Doni winata

DONI WINATA_165100085_PBD_SYSTEM DEVELOPMENT AND DATABASE SECURITYBasic Data (Database) Basic data (English: database) is a collection of information stored on a computer systematically so that it can be used on a computer program to obtain information from the database. Software used to manage and release queries (databases) is called a management database system (database management system, DBMS).


2019 ◽  
Author(s):  
Doni winata

Basic Data (Database) Basic data (English: database) is a collection of information stored on a computer systematically so that it can be used on a computer program to obtain information from the database. Software used to manage and release queries (databases) is called a management database system (database management system, DBMS).Computer system security in the Database is categorized in several aspects, namely: 1. Privacy / Confidentiality2. Integration3. Authentication4. Availability5. Nonrepudiation6. Access control


2010 ◽  
Vol 10 (11) ◽  
pp. 20-29
Author(s):  
Seung-Geun Oh ◽  
Young-Hee Im ◽  
Yong-Wha Chung ◽  
Jin-Kyung Chang ◽  
Dai-Hee Park

Author(s):  
Hamidah Ibrahim

A vital problem that should be tackled in today’s database system is guaranteeing database consistency. Many techniques and tools have been devised to fulfill this requirement in many interrelated research areas such as concurrency control, security control, reliability control, and integrity control (Eswaran & Chamberlin, 1975; Grefen, 1993). Concurrency control deals with the prevention of inconsistencies caused by concurrent access by multiple users or applications to a database. Security control deals with preventing users from accessing and modifying data in a database in unauthorized ways. Reliability control deals with the prevention of errors due to the malfunctioning of system hardware or software. Integrity control deals with the prevention of semantic errors made by users due to their carelessness or lack of knowledge. This chapter is concerned only with integrity control.


Author(s):  
YUN BAI ◽  
YAN ZHANG

In this paper, we propose a formal approach of Artificial Intelligence (AI) in securing object oriented database systems. We combine the specification of object oriented database with security policies and provide its formal syntax and semantics. The properties in the inheritance of authorizations in object oriented database system and reasoning about authorizations on data objects are also investigated in detail.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Muneeb -ul-Hasan ◽  
Siti Hajar Othman

Today, databases are on of the most important things in the IT world and it is also becoming more and more popular and organizations globally are gradually moving their traditional IT setup to database model to gain the benefits of securing the data and in terms of providing easy access to, and elasticity of IT services. With database security, the IT service roles within an organization become integrated hence giving the overall IT operating model a more structured layout. Such objectivity however can only be materialized when proper planning and execution are put in place. As such, a proper execution and implementation of database system would include a stringent set of checks and audit processes. The goal of database auditing is central towards determining if the services engaged and its―maintainers are meeting certain legal requirements in terms of protecting customers data and organization standards to achieve secure data assets success against various security threats. Therefore, this project explores the factors influencing security audit quality by collecting data using structured group discussion.


Sign in / Sign up

Export Citation Format

Share Document