2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 2007
DOI: 10.1109/idaacs.2007.4488489
|View full text |Cite
|
Sign up to set email alerts
|

Modern Approaches to the Database Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Total losses are related to the unauthorized access to information and theft of proprietary information for 2006 -$16,651,000 for the 313 spondents. These digits are showing the seriousness of the problem [1].…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Total losses are related to the unauthorized access to information and theft of proprietary information for 2006 -$16,651,000 for the 313 spondents. These digits are showing the seriousness of the problem [1].…”
Section: Motivationmentioning
confidence: 99%
“…They may be statistical data produced by Census Bureau demographic surveys and Federal agencies such as National Center for Education Statistics and Energy Information Administration; they may also be databases released by the Department of Motor Vehicles and Health Maintenance Organizations . In these cases, all released data are public; what is critical for the owner of the data is to make sure that the released data are not tampered with it [1]. Databases are the foundations of business systems such as web servers and ERP applications.…”
Section: Motivationmentioning
confidence: 99%
“…Based on our survey conducted the vulnerabilities in database are defined as: poor architecture, misconfigurations, and vendor bugs incorrect usage [2]. 3.1 Vendor bugs refer to buffer overflows and other programming errors that result in users executing the commands they are allowed to be execute.…”
Section: About the Vulnerabilities In Database Management Systemmentioning
confidence: 99%
“…Latest approaches of protecting database are illustrated in [2]. All of these approaches are related to CIA.…”
Section: Different Aspectsmentioning
confidence: 99%
“…Based on our survey conducted the vulnerabilities in database are defined as: poor architecture, misconfigurations, and vendor bugs incorrect usage [2].…”
Section: About the Vulnerabilities In Database Management System (Vdbms)mentioning
confidence: 99%