2012 Fourth International Conference on Intelligent Networking and Collaborative Systems 2012
DOI: 10.1109/incos.2012.95
|View full text |Cite
|
Sign up to set email alerts
|

Inference Detection and Database Security for a Business Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…All users can boundlessly get information from the DB server in an un-secure DB system. All hosts are allowed to associate with the server from any IP address and link with the DB server, making everyone's information accessible in the storage engine [23,24].…”
Section: Secure Databasesmentioning
confidence: 99%
“…All users can boundlessly get information from the DB server in an un-secure DB system. All hosts are allowed to associate with the server from any IP address and link with the DB server, making everyone's information accessible in the storage engine [23,24].…”
Section: Secure Databasesmentioning
confidence: 99%
“…The inference is used to find information hidden from common users. Popeea T et al [32] presented multi-layer security to database anonymity and database security in a data warehouse which contains information of current and past employees of large companies. They mainly focus on securing communication channel, securing operating system and securing the database.…”
Section: E Inference Controlmentioning
confidence: 99%
“…And since the data is being shared among various server digitally here arises the need of better understanding of sensitive database security, Traian Popeea and their co researchers have stated in their work [1]. The data which we are storing in the database or computer is growing very rapidly and the people who want to access those databases are also growing rapidly therefore the database security has become essential day by day.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Sensitive data in business includes employees personal details such as PAN card number, passport number, bank account, medical records, employee credit card details, identification details of employee etc and most importantly the company details such as financial details, tender details, contract information, configuration of firewalls etc. [1]. Database and the data within them specially is the primary target for most of the intruders.…”
Section: Introductionmentioning
confidence: 99%