2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials 2015
DOI: 10.1109/icstm.2015.7225407
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and effective security model for database specially designed to avoid internal threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The authors proposed a security model to mitigate highperformance internal threats; they implemented security rules describing policies for users, users interact directly with the database; Based on security model analyses, permissions are set for the user to access a certain part of the base; as a result of the deployment you will get a base and tables will not be accessed if you do not have the permissions by the database administrator [10].…”
Section: A Materialsmentioning
confidence: 99%
“…The authors proposed a security model to mitigate highperformance internal threats; they implemented security rules describing policies for users, users interact directly with the database; Based on security model analyses, permissions are set for the user to access a certain part of the base; as a result of the deployment you will get a base and tables will not be accessed if you do not have the permissions by the database administrator [10].…”
Section: A Materialsmentioning
confidence: 99%
“…A.Shastri and P.N. Chatur [7], uses a security-based model for checking the signature of the authentic users. N.A.…”
Section: Literature Reviewmentioning
confidence: 99%