2012
DOI: 10.5120/7879-1188
|View full text |Cite
|
Sign up to set email alerts
|

Database Security Protection based on a New Mechanism

Abstract: The database security is one of the important issues that should take a complete attention from researchers. Although applying the traditional security mechanisms, the database still violate from both of external and internal users. So, the researchers develop a Database Intrusion Detection System (DBIDS) to detect intrusion as soon as it occurs and override its malicious affects. The previous work developed a DBIDS as a third party product which is isolated from the DBMS security functions especially access c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Some specific training is necessary to work with any of these technologies. Few works have been done about protecting data for confidentiality, integrity and access control to sensitive information as those discussed by Rezk et al (2012). In their purpose, when user submits a query to execute, the system checks if he has authority to access data items in the query, the context in which the user accesses the data items is checked to determine if he follows his normal behavior or not.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some specific training is necessary to work with any of these technologies. Few works have been done about protecting data for confidentiality, integrity and access control to sensitive information as those discussed by Rezk et al (2012). In their purpose, when user submits a query to execute, the system checks if he has authority to access data items in the query, the context in which the user accesses the data items is checked to determine if he follows his normal behavior or not.…”
Section: Discussionmentioning
confidence: 99%
“…Considering that an incident can occur when unprepared staff operates complex biomedical system, all biomedical systems should have access control for each available process into the system. One solution reported by Rezk et al (2012) makes it possible to mine the dependency among user's data items from his transaction log and generates specific rules, which determine the context in which the user access the data items. According to them the challenge is building an efficient Database Intrusion Detection System, which can detect any malicious transaction with low false positive rate and high detection rate and integrating it with access control, in order to strength the database security.…”
Section: Biomedicalmentioning
confidence: 99%