2018
DOI: 10.23851/mjs.v29i2.332
|View full text |Cite
|
Sign up to set email alerts
|

Challenges and Security Vulnerabilities to Impact on Database Systems

Abstract: Abstract A lot of institutions depends at present on the systems database operations and their daily activities, thus providing a means for the maintenance of permanent data can refer to it at any time, as well as to search and to modify the data easily. in this paper to determine the security challenges in the databases, and requirements necessary to address those challenges in the data value to provide security base, and to determine the security rules and know the weaknesses that can be exploited any … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 5 publications
(13 reference statements)
0
6
0
2
Order By: Relevance
“…Table 4 shows the encryption test results of the 6 columns of the "agent" table deploying the model (1). Likewise, in the model (2) implementation, one encryption key of the table "agent" has protected with a single Km generated using this model. Then, this protection was tested using the model (B).…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Table 4 shows the encryption test results of the 6 columns of the "agent" table deploying the model (1). Likewise, in the model (2) implementation, one encryption key of the table "agent" has protected with a single Km generated using this model. Then, this protection was tested using the model (B).…”
Section: Resultsmentioning
confidence: 99%
“…Database (DB) level encryption is a way to encrypt and decrypt data within the Database Management System (DBMS) using keys held by the DB server [1]. In fact, this encryption model offers major advantages, in particular, those related to the security of the encryption keys against external attacks performed outside the information system [2,3]. Though the probability of the administrator attack is not negligible, he owns large privileges on DB.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, it has been the subject of several debates and studies by experts and researchers in the data security field. The main purpose is to protect sensitive data against unavailability, leakage, and modification face to attackers' threats [9], [21], [22].…”
Section: Introductionmentioning
confidence: 99%