Module: Database Security
This module provides a collection of sub-modules which altogether provide an account of security issues in database systems, and shows how current commercial or future database systems may be designed to ensure both integrity and confidentiality.
Features:
1. Comprehensive, in-depth coverage of database security,
including models, systems, architectures and standards
2. Emphasis on the
design of secure database systems
3. Coverage of available security
mechanisms and protection measures provided by DBMS and data-security packages
4. Up-to-date trends in database security, including issues of security in
object-oriented databases, in statistical databases and auditing, ..., etc.
Submodule# | Title | code | Description | Prerequisite | *Referenced module |
1 |
Overview of Database Security | Data1 | Introduction, Security Problems in Databases, Security Controls, Designing Database Security | ||
2 | Access Control for DBMS | Data2 | Security Policies, Authentication Rules, Security Mechanisms, Architecture of a DBMS Including Security Features | ||
3 |
Database Security Models | Data3 | Wood et al. Model, Sea View Model, Jajodia and Sandhu's Model |
OS Security Models |
OSS4 |
4 |
Database Security Design | Data4 | Introduction, Secure DBMS Design, Design of Secure Databases | ||
5 |
Statistical Database Protection | Data5 | Introduction, Basic Concepts and Assumptions, Types of Attacks, Inference Controls, Evaluation Criteria for Control Comparison | ||
6 | Active Database Protection | Data6 | Introduction, Security in Active Databases | ||
7 | Object-Oriented Database Protection | Data7 |
Security in Object-Oriented Databases, Orion Model, SORION Model, Millen-Lunt Model |
A1 Secure DBMS prototype
aggregation abstration
anomaly
database
anomaly detection model
Audit Expert System
...