2005
DOI: 10.1016/j.infsof.2004.09.013
|View full text |Cite
|
Sign up to set email alerts
|

Designing secure databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 41 publications
(25 citation statements)
references
References 15 publications
0
25
0
Order By: Relevance
“…Fernández-Medina and Piattini [13] proposed a methodology to design multilevel databases based on MAC policies. The methodology enables creating conceptual and logical models of multilevel databases, and implementing the models using Oracle Label Security [8].…”
Section: Review and Evaluation Of Secure Software Development Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Fernández-Medina and Piattini [13] proposed a methodology to design multilevel databases based on MAC policies. The methodology enables creating conceptual and logical models of multilevel databases, and implementing the models using Oracle Label Security [8].…”
Section: Review and Evaluation Of Secure Software Development Methodsmentioning
confidence: 99%
“…Various efforts to deal with the security aspect at the early stages of the software development life cycle have been made. These include various extensions to UML that enable modeling of security features such as UMLsec [16], threat and attack modeling techniques such as misuse cases [31], methods for requirements engineering such as Secure Tropos [27], and methodologies for developing secure applications and databases such as [12,13]. Nevertheless, such methods primarily provide guidelines of how to deal with security within a certain stage of the software development process, or address only specific security-related aspects or mechanisms in the development process.…”
Section: Introductionmentioning
confidence: 99%
“…Modern businesses are forced to manage their information in order to survive in the digital era [8]. Organisations without a proper database system are rare.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, we have proposed a methodology for relational DB which integrates security aspects at all stages of the development process [7]. However, to the best of our knowledge, there are no works that deal with security when developing an XML DB.…”
Section: Introductionmentioning
confidence: 99%