2020
DOI: 10.1016/j.jisa.2020.102654
|View full text |Cite
|
Sign up to set email alerts
|

Database intrusion detection using role and user behavior based risk assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…Role-Based Access Control (RBAC) [8] complements PoLP by assigning access permissions based on predefined roles. This streamlines user privilege management, ensuring individuals have access only to resources essential for their specific organizational roles.…”
Section: State Of the Artmentioning
confidence: 99%
“…Role-Based Access Control (RBAC) [8] complements PoLP by assigning access permissions based on predefined roles. This streamlines user privilege management, ensuring individuals have access only to resources essential for their specific organizational roles.…”
Section: State Of the Artmentioning
confidence: 99%
“…With incredibly high secure data and an expanded online presence, the worries concerning DB security are high at all-time. As more systems are connected and brought online to improve access, the sensitivity towards attacks is also increased, estimated to be about $1.3 million in massive financial losses; these mischievous attacks are also liable for public reputation and client relations with the association [21,22]. All users can boundlessly get information from the DB server in an un-secure DB system.…”
Section: Secure Databasesmentioning
confidence: 99%
“…The remarkable development in the deployment of DB's is the required architecture to cope with information that can be attributed to the rising big data. Every 1.2 years, according to research, the entire quantity of institutional information doubles [21].…”
Section: Introductionmentioning
confidence: 99%
“…If the passenger submits the data and abandons taking the elevator, the system will delete the user's request and release space for others. It is also important to verify the correspondence between the user and the submitted data [39][40][41]. Figure 6 shows the two ways of reservation.…”
Section: Strategy For Preventing Malicious Data Intrusionmentioning
confidence: 99%
“…If the task cannot be transported at one time, a remaining matrix R up n×n will be generated. The specific process of the matrix iterative algorithm will be given below, and the initialized waiting matrix W up n×n can be written as Equation (40).…”
Section: Numerical Examplementioning
confidence: 99%