Architectures for intrusion tolerant database systems

P Liu - 18th Annual Computer Security Applications …, 2002 - ieeexplore.ieee.org
In this paper we propose four architectures for intrusion-tolerant database systems. While
traditional secure database systems rely on prevention controls, an intrusion-tolerant …

Modeling and evaluating the survivability of an intrusion tolerant database system

H Wang, P Liu - Computer Security–ESORICS 2006: 11th European …, 2006 - Springer
The immaturity of current intrusion detection techniques limits the traditional security systems
in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome …

Security issues in databases

S Imran, I Hyder - 2009 Second International Conference on …, 2009 - ieeexplore.ieee.org
Security models, developed for databases, differ in many aspects because they focus on
different features of the database security problem or because they make different …

Towards a security benchmark for database management systems

M Vieira, H Madeira - 2005 International Conference on …, 2005 - ieeexplore.ieee.org
One of the main problems faced by organizations is the protection of their data against
unauthorized access or corruption due to malicious actions. Database management systems …

Database security threats: A survey study

NA Al-Sayid, D Aldlaeen - 2013 5th international conference on …, 2013 - ieeexplore.ieee.org
Databases are the repositories of the most important and expensive information in the
enterprise. With the increase in access to data stored in databases, the frequency of attacks …

[PDF][PDF] Integrity in trusted database systems

RR Schell, DE Denning - Proceedings 9th DoD/NBS Computer …, 1986 - faculty.nps.edu
A trusted computer system is designed to be'secure'with respect to some well-defined
security policy. There are two major classes of information security policy:(1) secrecy …

The design and implementation of a self-healing database system

P Liu, J Jing, P Luenam, Y Wang, L Li… - Journal of Intelligent …, 2004 - Springer
In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-
tolerant database prototype system. While traditional secure database systems rely on …

A novel intrusion detection system model for securing web-based database systems

S Wenhui, TDH Tan - 25th Annual International Computer …, 2001 - ieeexplore.ieee.org
Intrusion detection (ID) has become an important technology for protecting information
resources and databases from malicious attacks and information leakage. This paper …

Application-level isolation to cope with malicious database users

S Jajodia, P Liu, CD McCollum - Proceedings 14th Annual …, 1998 - ieeexplore.ieee.org
System protection mechanisms such as access controls can be fooled by authorized but
malicious users, masqueraders, and misfeasors. Intrusion detection techniques are …

Supporting multiple access control policies in database systems

E Bertino, S Jajodia, P Samarati - Proceedings 1996 IEEE …, 1996 - ieeexplore.ieee.org
Although there are several choices of policies for protection of information, access control
models have been developed for a fixed set pre-defined access control policies that are then …