2009 Second International Conference on Dependability 2009
DOI: 10.1109/depend.2009.17
|View full text |Cite
|
Sign up to set email alerts
|

An Appraisal to Assess the Security of Database Configurations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…Due to the lack of space we do not present the complete list of recommendations, but interested readers can find it at [2].…”
Section: Defining Security Best Practicesmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to the lack of space we do not present the complete list of recommendations, but interested readers can find it at [2].…”
Section: Defining Security Best Practicesmentioning
confidence: 99%
“…In this preliminary example the benchmark is defined by: 1. The top 5 best practices that are presented in first five rows of Table 1 and the corresponding relative weights (see [2] for details); 2. The threat vectors presented in Table 2. 3.…”
Section: Preliminary Examplementioning
confidence: 99%
See 1 more Smart Citation
“…The final list includes 64 database configuration best practices associated with a weighted "criticality" defined by consensual judgment of several experts. More details can be found in [2]. Table II presents the 14 best practices (and their corresponding weights) that were pointed out as the most important ones by the experts.…”
Section: Sql Injection Enhancementmentioning
confidence: 99%
“…In [1,2] it is presented an approach to assess the security of DBMS configurations. That tool is based on a flat-out comparison of what security best practices are being applied or not in a given installation, by applying a set of predefined security tests.…”
Section: Background and Related Workmentioning
confidence: 99%