Computer Science &Amp; Information Technology ( CS &Amp; IT ) 2015
DOI: 10.5121/csit.2015.50801
|View full text |Cite
|
Sign up to set email alerts
|

Critical Assessment of Auditing Contributions to Effective and Efficient Security in Database Systems

Abstract: Database auditing has become a very crucial aspect of security as organisations increase their adoption of database management systems (DBMS) as major asset that keeps, maintain and monitor sensitive information. Database auditing is the group of activities involved in observing a set of stored data in order to be aware of the actions of users. The work presented here outlines the main auditing techniques and methods. Some architectural based auditing systems were also considered to assess the contribution of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Olumuyiwa O. Matthew et al [24] discussed several already existing database auditing techniques such as statement auditing, privilege auditing, schema object auditing and fine-grained auditing etc. at various database environments.…”
Section: Auditingmentioning
confidence: 99%
See 2 more Smart Citations
“…Olumuyiwa O. Matthew et al [24] discussed several already existing database auditing techniques such as statement auditing, privilege auditing, schema object auditing and fine-grained auditing etc. at various database environments.…”
Section: Auditingmentioning
confidence: 99%
“…Insider Attack DATA-CENTRIC APPROACH Performance consideration [24] Outlines main auditing techniques and methods Issues relating to handling of audit trail are also discussed and key important impacts of security are also highlighted In our survey adversary can be internal users or database administrator. He or she can perform the following actions to attack the database.…”
Section: Rbac Approach Fine Grained Access Controlmentioning
confidence: 99%
See 1 more Smart Citation