2009 Fourth International Conference on Computer Sciences and Convergence Information Technology 2009
DOI: 10.1109/iccit.2009.207
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Database Auditing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…Security and data centre teams must be sharp enough to implement and enforce a set of best practices to address the insider threats. IT architects must then bolster the policies by using database auditing rather than other security features that has been built into other major database platforms [10].…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Security and data centre teams must be sharp enough to implement and enforce a set of best practices to address the insider threats. IT architects must then bolster the policies by using database auditing rather than other security features that has been built into other major database platforms [10].…”
Section: Literature Reviewmentioning
confidence: 99%
“…al. [16] had deliberated in detail the importance of IT audit and the IT audit quality. According to their studies, IT audits are widely used internally by organisations to examine the operations effectiveness, controls, and security of critical systems, which will be used to identify opportunities for improvement or areas of weakness.…”
Section: Amentioning
confidence: 99%
“…With the ever-changing needs, on the one hand, we improve the traditional model. On the other hand, lots of new access control techniques and models are proposed, some famous like trust management, digital rights management and usage control model [8]. Audit strengthens the security of database through recording and analyzing the activities in the database.…”
Section: Related Workmentioning
confidence: 99%
“…As established by Principle 1, a clear functional separation of concerns [17] is required in order to prevent potential changes in audit records whilst avoiding overlapping functional responsibilities. Although the administrator role (DBA) is normally in charge of managing audit functions [18], a explicit forensic role and a corresponding forensic database should be created for preventing discretionary violations of administrative functions, such as disabling audit mechanisms on convenience [19].…”
Section: A Separation Of Concernsmentioning
confidence: 99%