2019
DOI: 10.11591/ijeecs.v14.i3.pp1391-1394
|View full text |Cite
|
Sign up to set email alerts
|

Estimate model of system management for database security

Abstract: <p>A generalized model of information protection of a database management system is proposed, which can be used to implement database protection under any database management system. This model development methodology consists of four stages: requirements gathering, database analysis, “multi-level relational logical construction and a specific logical construction. The first three steps define actions for analyzing and developing a secure database, thus creating a generalized and secure database model”.&… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Such stress testing activities can be carried out with both the primary and DR databases, or it can also be feasible to offload the work to the DR database. A methodology for designing secure databases was presented in earlier research [46], [47]. Today, very advanced and advanced encryption methods are available.…”
Section: Resultsmentioning
confidence: 99%
“…Such stress testing activities can be carried out with both the primary and DR databases, or it can also be feasible to offload the work to the DR database. A methodology for designing secure databases was presented in earlier research [46], [47]. Today, very advanced and advanced encryption methods are available.…”
Section: Resultsmentioning
confidence: 99%
“…These tools cannot be adjusted in real time and have limited flexibility in modifying and analyzing the data stored in the source and target databases. Many solutions cannot provide a statistical perspective on connected databases on both sides [7][8][9][10][11][12][13][14][15][16][17][18][19][20].…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, when data are loaded for the first time, the complete load approach is employed, involving the complete cleaning of tables. In addition, when adding modified or new records to a target source, an incremental load is employed [12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…To succeed in the globalized environment, businesses must ensure the protection of their vital data. DBs can be safeguarded from unauthorized access [12][13][14]. When a DB is outsourced to the cloud, cloud platforms introduce security challenges such as unreliable service providers, malicious cloud employees, data protection, consistency, and scalability.…”
Section: Introductionmentioning
confidence: 99%