Architectures for intrusion tolerant database systems
P Liu - 18th Annual Computer Security Applications …, 2002 - ieeexplore.ieee.org
In this paper we propose four architectures for intrusion-tolerant database systems. While
traditional secure database systems rely on prevention controls, an intrusion-tolerant …
traditional secure database systems rely on prevention controls, an intrusion-tolerant …
Modeling and evaluating the survivability of an intrusion tolerant database system
The immaturity of current intrusion detection techniques limits the traditional security systems
in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome …
in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome …
Security issues in databases
Security models, developed for databases, differ in many aspects because they focus on
different features of the database security problem or because they make different …
different features of the database security problem or because they make different …
Towards a security benchmark for database management systems
One of the main problems faced by organizations is the protection of their data against
unauthorized access or corruption due to malicious actions. Database management systems …
unauthorized access or corruption due to malicious actions. Database management systems …
Database security threats: A survey study
NA Al-Sayid, D Aldlaeen - 2013 5th international conference on …, 2013 - ieeexplore.ieee.org
Databases are the repositories of the most important and expensive information in the
enterprise. With the increase in access to data stored in databases, the frequency of attacks …
enterprise. With the increase in access to data stored in databases, the frequency of attacks …
[PDF][PDF] Integrity in trusted database systems
RR Schell, DE Denning - Proceedings 9th DoD/NBS Computer …, 1986 - faculty.nps.edu
A trusted computer system is designed to be'secure'with respect to some well-defined
security policy. There are two major classes of information security policy:(1) secrecy …
security policy. There are two major classes of information security policy:(1) secrecy …
The design and implementation of a self-healing database system
In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-
tolerant database prototype system. While traditional secure database systems rely on …
tolerant database prototype system. While traditional secure database systems rely on …
A novel intrusion detection system model for securing web-based database systems
S Wenhui, TDH Tan - 25th Annual International Computer …, 2001 - ieeexplore.ieee.org
Intrusion detection (ID) has become an important technology for protecting information
resources and databases from malicious attacks and information leakage. This paper …
resources and databases from malicious attacks and information leakage. This paper …
Application-level isolation to cope with malicious database users
System protection mechanisms such as access controls can be fooled by authorized but
malicious users, masqueraders, and misfeasors. Intrusion detection techniques are …
malicious users, masqueraders, and misfeasors. Intrusion detection techniques are …
Supporting multiple access control policies in database systems
Although there are several choices of policies for protection of information, access control
models have been developed for a fixed set pre-defined access control policies that are then …
models have been developed for a fixed set pre-defined access control policies that are then …