Login New user?  
Information Sciences Letters
An International Journal


Volumes > Vol. 2 > No. 3


Design and implementation of multi-layer policies for database security

PP: 147-153
Ayman Mohamed Mostafa, Mohamed Hashem Abdel-Aziz, Ibrahim Mahmoud El-Henawy,
The security of database depends on a set of systems, roles, procedures, and processes that protect the entire database from unintended activities. Unintended activities can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes made by authorized users. If any intruder succeeds in attacking the system network, the database security will be the last line of defense in protecting confidentiality, availability, and integrity. This paper presents interactive multi-layer policies for securing relational database that lies on the server side, monitor authorized users who may misuse their privileges on the client side, and monitor database administrators who may use their multiple privileges to penetrate the security system. These multi-layer policies can be combined together to create a defense system that puts the intruder under pressure at all security levels in order to protect integrity and confidentiality of database.

  Home   About us   News   Journals   Conferences Contact us Copyright naturalspublishing.com. All Rights Reserved