Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

Detecting anomalous access patterns in relational databases

A Kamra, E Terzi, E Bertino - The VLDB Journal, 2008 - Springer
A considerable effort has been recently devoted to the development of Database
Management Systems (DBMS) which guarantee high assurance and security. An important …

A data-centric approach to insider attack detection in database systems

S Mathew, M Petropoulos, HQ Ngo… - Recent Advances in …, 2010 - Springer
The insider threat against database management systems is a dangerous security problem.
Authorized users may abuse legitimate privileges to masquerade as other users or to …

On the metric properties of discrete space-filling curves

C Gotsman, M Lindenbaum - IEEE Transactions on Image …, 1996 - ieeexplore.ieee.org
A space-filling curve is a linear traversal of a discrete finite multidimensional space. In order
for this traversal to be useful in many applications, the curve should preserve" locality". We …

Intrusion detection in RBAC-administered databases

E Bertino, E Terzi, A Kamra… - 21st Annual Computer …, 2005 - ieeexplore.ieee.org
A considerable effort has been recently devoted to the development of database
management systems (DBMS) which guarantee high assurance security and privacy. An …

[PDF][PDF] Design, Implementation, and Evaluation of Repairable File Service.

N Zhu, T Chiueh - DSN, 2003 - Citeseer
The data contents of an information system may be corrupted due to security breaches or
human errors. This project focuses on intrusion tolerance techniques that speed up the …

A secure database system using homomorphic encryption schemes

Y Gahi, M Guennoun, K El-Khatib - arXiv preprint arXiv:1512.03498, 2015 - arxiv.org
Cloud computing emerges as an attractive solution that can be delegated to store and
process confidential data. However, several security risks are encountered with such a …

Towards mechanisms for detection and prevention of data exfiltration by insiders: Keynote talk paper

E Bertino, G Ghinita - Proceedings of the 6th ACM Symposium on …, 2011 - dl.acm.org
Data represent an extremely important asset for any organization. Confidential data such as
military secrets or intellectual property must never be disclosed outside the organization …

A partition-driven integrated security architecture for cyberphysical systems

Y Javed, M Felemban, T Shawly, J Kobes… - Computer, 2020 - ieeexplore.ieee.org
Emerging cyberphysical systems incorporate systems of systems that have functional
interdependencies. With the increase in complexity of cyberphysical systems, the attack …

A survey on database intrusion detection: approaches, challenges and application

R Jindal, I Singh - International Journal of Intelligent …, 2019 - inderscienceonline.com
Databases store vital information of an organisation and are therefore integral for its efficient
working. This necessitates the establishment of database intrusion detection systems …