2014
DOI: 10.5120/14905-3402
|View full text |Cite
|
Sign up to set email alerts
|

Security Issues and Their Techniques in DBMS - A Novel Survey

Abstract: Nowadays a Database security has become an important issue in technical world. The main objective of database security is to forbid unnecessary information exposure and modification data while ensuring the availability of the needed services. A numbers of security methods have been created for protecting the databases. Many security models have been developed based on different security aspects of database. All of these security methods are useful only when the database management system is designed and develo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…The information is a critical issue of today collaborative environment so there are many possibilities of privileged abuse i.e. the resources are illegally accessible by an unauthorized users or attackers (Rafiq, 2014 andMohd et al, 2014).…”
Section: Security Threats To Databasementioning
confidence: 99%
See 2 more Smart Citations
“…The information is a critical issue of today collaborative environment so there are many possibilities of privileged abuse i.e. the resources are illegally accessible by an unauthorized users or attackers (Rafiq, 2014 andMohd et al, 2014).…”
Section: Security Threats To Databasementioning
confidence: 99%
“…The Means of confidentiality is to the protection of data against unauthorized disclosure and it can be achieved by access control mechanism. It can be further enhanced by the use of encryption techniques is applied on data while stored into secondary storage or transmitted on a Network (Emil, 2009;Deepika &Soni, 2015 andMohd et al, 2014). Integrity concept is used to Prevention of unauthorized accessing and improper data modification.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The rapid growth of network technology and information processing system led to the development of distributed database management system. In this type of system, data are stored in different computers scattered in different geographical sites connected via network [1,2]. Distributed database includes number of functions like distributed transaction management, Distributed query processing, security and integrity.…”
Section: Introductionmentioning
confidence: 99%
“…These activities can be considered as unconstitutional modification, authenticated exploitation and cruel attacks. [1,2,3]. Databases can be secured by many covers and types of facts safety, containing encryption, authentication, authorization and access control.…”
Section: Introductionmentioning
confidence: 99%