A Realization of Security Model on Unified Database Console

Article Preview

Abstract:

As an extremely important platform of data storage, database management system (DBMS) is widely used in all kinds of enterprises and departments. The availability and security is a critical performance index for database. How to help administrator keep database secure and effective is a key job of database administration. This paper proposes a secure model of database management for administrator and achieved a secure database console to implement this model.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

3584-3589

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Carter, David L., Katz, Andra J. Computer Crime: An Emerging Challenge for Law Enforcement[R]. American: FBI Law Enforcement Bulletin, December (1996).

Google Scholar

[2] N. Yuhanna, Comprehensive Database Security Requires Native DBMS Features and Third-Party Tools, Market overview, Forrester Research Inc., May (2005).

Google Scholar

[3] U. Mattsson, Database Encryption – How to Balanace Security with performance", ITtoolbox Database: http: / database ittoolbox. Com / documents/peer publishing / database – encrytion – how – to – balanace-security-with-performance-403, july 2005K. Elissa, "Title of paper if known, unpublished.

DOI: 10.2139/ssrn.670561

Google Scholar

[4] R. Charlot, Providing an Infrastructure For A Cross Database Management Tool. " Proceedings of the International Conference on Information Technology: Coding and Computing(ITCC, 02). Washington, DC: IEEE Computer Society, 2000: 196-200.

DOI: 10.1109/itcc.2002.1000386

Google Scholar

[5] I. Mohamed, K. Joan, C. Justin. A visual Database Management Tool: the Design of a Semi-intelligent DBA Tool for a Relational DBMS., Proceedings of the 8th International Workshop on Database and Expert Systems Application. Wahington, DC: IEEE computer Society, 1997: 366-371.

DOI: 10.1109/dexa.1997.617313

Google Scholar

[6] L. D. Crenshaw . Database Performance Monitoring use of software tools and traditional processes.

Google Scholar

[7] Francois Charvet, Ashish pande. database performance study.

Google Scholar

[8] K. Nagaraja, F. Oliveira,R. Bianchini R.P. Martin, and T.D. Nguyen. Understanding and Validating Database System Administration,. In proc. USENIX Annual Technical Conference. (2006).

Google Scholar

[9] Huang J, Qing SH, Wen HZ. Timed Role-Based Access Control. Journal of Software, 2003, 14(11): 1944-(1954).

Google Scholar

[10] Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control,. ACM Transactions on Information and System Srcurity, 2001, 4(3): 224-274.

DOI: 10.1145/501978.501980

Google Scholar

[11] Soon M. Chung and Pyeong S. Mah, Schema Integration for Multidatabase Using the Unified Relational and Object-Oriented Model, ACM.

Google Scholar

[12] M. G. Ali. Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System, International Journal of Computer Science and Information Security, USA, (2009).

Google Scholar

[13] D. Tsichritzis, A. Klug, The ANSI/X3/SPARC DBMS Framework Report of the Study Group on Database Managemnt Systems. Information Systems, 1: 17-191, (1978).

DOI: 10.1016/0306-4379(78)90001-7

Google Scholar