Database security-concepts, approaches, and challenges
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …
daily business, they become more vulnerable to security breaches even as they gain …
Detecting anomalous access patterns in relational databases
A considerable effort has been recently devoted to the development of Database
Management Systems (DBMS) which guarantee high assurance and security. An important …
Management Systems (DBMS) which guarantee high assurance and security. An important …
A data-centric approach to insider attack detection in database systems
S Mathew, M Petropoulos, HQ Ngo… - Recent Advances in …, 2010 - Springer
The insider threat against database management systems is a dangerous security problem.
Authorized users may abuse legitimate privileges to masquerade as other users or to …
Authorized users may abuse legitimate privileges to masquerade as other users or to …
On the metric properties of discrete space-filling curves
C Gotsman, M Lindenbaum - IEEE Transactions on Image …, 1996 - ieeexplore.ieee.org
A space-filling curve is a linear traversal of a discrete finite multidimensional space. In order
for this traversal to be useful in many applications, the curve should preserve" locality". We …
for this traversal to be useful in many applications, the curve should preserve" locality". We …
Intrusion detection in RBAC-administered databases
A considerable effort has been recently devoted to the development of database
management systems (DBMS) which guarantee high assurance security and privacy. An …
management systems (DBMS) which guarantee high assurance security and privacy. An …
[PDF][PDF] Design, Implementation, and Evaluation of Repairable File Service.
N Zhu, T Chiueh - DSN, 2003 - Citeseer
The data contents of an information system may be corrupted due to security breaches or
human errors. This project focuses on intrusion tolerance techniques that speed up the …
human errors. This project focuses on intrusion tolerance techniques that speed up the …
A secure database system using homomorphic encryption schemes
Cloud computing emerges as an attractive solution that can be delegated to store and
process confidential data. However, several security risks are encountered with such a …
process confidential data. However, several security risks are encountered with such a …
Towards mechanisms for detection and prevention of data exfiltration by insiders: Keynote talk paper
Data represent an extremely important asset for any organization. Confidential data such as
military secrets or intellectual property must never be disclosed outside the organization …
military secrets or intellectual property must never be disclosed outside the organization …
A partition-driven integrated security architecture for cyberphysical systems
Emerging cyberphysical systems incorporate systems of systems that have functional
interdependencies. With the increase in complexity of cyberphysical systems, the attack …
interdependencies. With the increase in complexity of cyberphysical systems, the attack …
A survey on database intrusion detection: approaches, challenges and application
Databases store vital information of an organisation and are therefore integral for its efficient
working. This necessitates the establishment of database intrusion detection systems …
working. This necessitates the establishment of database intrusion detection systems …