2005
DOI: 10.1109/tdsc.2005.9
|View full text |Cite
|
Sign up to set email alerts
|

Database security - concepts, approaches, and challenges

Abstract: Abstract-As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data protection must also include mechanisms for enforcing access control policies based on data contents, su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
191
0
1

Year Published

2006
2006
2021
2021

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 340 publications
(192 citation statements)
references
References 83 publications
0
191
0
1
Order By: Relevance
“…Because of its importance, a lot of prior research has focused on database security [3]. This paper focuses on row-level access control [3] that follows the Truman model 3 [19].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Because of its importance, a lot of prior research has focused on database security [3]. This paper focuses on row-level access control [3] that follows the Truman model 3 [19].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Usually, confidentiality is achieved by enforcing an access policy, or possibly by using some cryptographic tools. Privacy relates to what data can be safely disclosed without leaking sensitive information regarding the legitimate owner [5].…”
Section: Introductionmentioning
confidence: 99%
“…By using appropriate data mining techniques it is possible to explore the hidden patterns. But the threat to privacy becomes real since data mining techniques are able to derive highly sensitive knowledge from unclassified data which is not even known to database holders [6] . In order to overcome this issue the data owners may decide not to share or release such data for analysis provided they should make a compromise for exploring hidden knowledge [7] .…”
Section: Introductionmentioning
confidence: 99%