Database Management Systems (DBMS) have a long tradition in high security and several mechanisms needed to protect data have been proposed/consolidated in the database arena. However, the effectiveness of those mechanisms is very dependent on the actual configuration chosen by the database administrator. Tuning a large database is quite complex and achieving high security is a very difficult task that requires a lot of expertise and continuous and proactive work. In this paper we present an assessment tool aimed at evaluating the security of DBMS configurations. The proposed tool is simple and effective, and can be used by administrators with very little security knowledge. We evaluate the tool by performing the assessment of four different real database installations based on four well-known and widely used DBMS engines.
Subject
Computer security
Conference
International Conference on Dependability (DEPEND 2009), June 2009
Cited by
Year 2013 : 1 citations
Dilip kumar Choubey, Joy Bhattacharjee, Roopali Soni, "“Loss Minimization of Web Databases by Fine Grain Approach", International Journal of Engineering Research and Applications (IJERA), Vol. 3 Issue 1, January-February 2013.
Year 2012 : 2 citations
Neera Batra, Hemant Aggarwal, "Autonomous Multilevel Policy Based Security tonomous Multilevel Policy Based Security Configuration in Distributed Database", International Journal of Computer Science Issues (IJCSI), Vol. 9 Issue 6 No 2, November 2012.
Dilip kumar Choubey, Roopali Soni, Joy Bhattacharjee, "Privacy protection and fine grained access control to web database", IRNetExplore, India, 2012.
Year 2011 : 1 citations
Jianwu Zhang, Guoai Xu, Yixian Yang, Shize Guo, "A method for system auditing based on baseline assessment", IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, May 27-29, 2011.