Handbook of Database Security
DOI: 10.1007/978-0-387-48533-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Security Re-engineering for Databases: Concepts and Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…For Permissions, please e-mail: journals. permissions@oup.com 0022-1899 (print)/1537-6613 (online)/2011/20310-0001$14.00 DOI: 10.1093/infdis/jir056 prevalent sero19A strains detected in the United States, accounting for 77% of the sero19A collected in the ABC's surveillance program [12][13][14]. This pattern continued during the first few years of PCV7 use.…”
Section: Cc199 19amentioning
confidence: 99%
“…For Permissions, please e-mail: journals. permissions@oup.com 0022-1899 (print)/1537-6613 (online)/2011/20310-0001$14.00 DOI: 10.1093/infdis/jir056 prevalent sero19A strains detected in the United States, accounting for 77% of the sero19A collected in the ABC's surveillance program [12][13][14]. This pattern continued during the first few years of PCV7 use.…”
Section: Cc199 19amentioning
confidence: 99%
“…This problem is well known to the web application developers and security consultants, but little existing work has addressed it. Gertz et al in [2] pose this problem and presented some fundamental concepts and techniques that help administrators and security personnel to gradually evaluate and improve the security of a database. Also, Roichman in [3] proposed a method that uses the databases' built-in access control mechanisms enhanced with Parameterized Views and adapts them to work with web applications in order to prevent intrusions.…”
Section: Related Workmentioning
confidence: 99%