2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN) 2008
DOI: 10.1109/dsn.2008.4630074
|View full text |Cite
|
Sign up to set email alerts
|

Towards assessing the security of DBMS configurations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…We evaluated four real database installations using the benchmark. Some relevant characteristics of each installation can be found in Table 5, but more details of each one can be found in [1]. The minimum untrustworthiness result for each case is presented in Table 6.…”
Section: Preliminary Examplementioning
confidence: 99%
See 1 more Smart Citation
“…We evaluated four real database installations using the benchmark. Some relevant characteristics of each installation can be found in Table 5, but more details of each one can be found in [1]. The minimum untrustworthiness result for each case is presented in Table 6.…”
Section: Preliminary Examplementioning
confidence: 99%
“…Nevertheless, security has been largely absent from previous benchmarking effort. Using a rather different approach than previous security assessment tools (and not trustworthiness) [1,2], the goal of the proposed untrustworthiness benchmark is to present a useful representation that captures the essential elements through the decomposition of relevant threats and provides practical ways to characterize DBMS configurations in a relative manner through the idea of minimum untrustworthiness.…”
Section: Introductionmentioning
confidence: 99%
“…Neto and Vieira [12] propose an approach to assess the effectiveness of database management systems (DBMS) configurations concerning security. The approach consists in the use of a set of security best practices obtained through an analysis of the CIS security benchmarks for DBMS.…”
Section: Related Workmentioning
confidence: 99%
“…In [1,2] it is presented an approach to assess the security of DBMS configurations. That tool is based on a flat-out comparison of what security best practices are being applied or not in a given installation, by applying a set of predefined security tests.…”
Section: Background and Related Workmentioning
confidence: 99%