Научная статья на тему 'DATA BASE SECURITY TECHNOLOGIES THAT HELP PROTECT AGAINST MISUSE BY EXTERNAL HACKERS RELATED RESEARCH ARTICLES'

DATA BASE SECURITY TECHNOLOGIES THAT HELP PROTECT AGAINST MISUSE BY EXTERNAL HACKERS RELATED RESEARCH ARTICLES Текст научной статьи по специальности «СМИ (медиа) и массовые коммуникации»

CC BY
13
2
i Надоели баннеры? Вы всегда можете отключить рекламу.
Журнал
Russian Law Journal
Scopus
ВАК
Ключевые слова
Network / Realities / Climate / Organization / Security

Аннотация научной статьи по СМИ (медиа) и массовым коммуникациям, автор научной работы — Carmen Elena Mantilla Cabrera, Ruth Barba-Vera, Ligia Maricela Niama Rivera, Maria Lorena Villacrés Pumagualli

The paper bases on security gives which can be associated with the information base gadget which are mechanically employed by means of different relationship in their physical exercises. Realities bases are fundamental to changed business endeavor and specialists seeking, to frame the recuperation and support of ability dependable and proficient it's cared for in an enlightening assortment. Realities base connection and substance are noticeable as large organization property that must be fastidiously guaranteed considering the way that records bases are a most cherished objective for aggressors. The fundamental wellbeing necessities of understanding base structure resemble those of various enrolling framework. Assurance, guarantee and validity of data are referenced in each movement accomplished on net. Records are taken care of in measurements base for honest and successful approach to influence control those insights. Considering the criticalness of comprehension in affiliation, it's huge to ensure roughly the information blessing in the records base. A guaranteed records base is that the one that is responded from selective possible data base assaults. Those models are obvious in assorted perspectives as they might be directing unprecedented issues with the information base security. We have dissected a network of the attacks on the off chance that you need to be attainable with its counter measures and its oversee techniques so as to be practical. Guaranteeing roughly realities base is large way of thinking for the arranging of unequivocal and request based absolutely records base security necessities. Progress of guaranteed about and customary realities base for scattered climate is an incredibly major trouble. The basic thought riding this evaluation to perceive indisputable security inconveniences which has been talented eventually of orchestrating of an understanding base for dissipated climate.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «DATA BASE SECURITY TECHNOLOGIES THAT HELP PROTECT AGAINST MISUSE BY EXTERNAL HACKERS RELATED RESEARCH ARTICLES»

DATA BASE SECURITY TECHNOLOGIES THAT HELP PROTECT AGAINST MISUSE BY EXTERNAL HACKERS RELATED RESEARCH

ARTICLES

CARMEN ELENA MANTILLA CABRERA

Escuela Superior Politécnica de Chimborazo (ESPOCH) carmen.mantilla@espoch.edu.ec https://orcid.org/0000-0001-5422-7073

RUTH BARBA-VERA

Escuela Superior Politécnica de Chimborazo (ESPOCH) rbarba@espoch.edu.ec https://orcid.org/0000-0003-0272-171X

LIGIA MARICELA NIAMA RIVERA

Escuela Superior Politécnica de Chimborazo (ESPOCH) ligia.niama@espoch.edu.ec https://orcid.org/0000-0002-1818-0041

MARIA LORENA VILLACRÉS PUMAGUALLI

Escuela Superior Politécnica de Chimborazo (ESPOCH) marial.villacres@espoch.edu.ec https://orcid.org/0000-0002-5909-9629

Abstract - The paper bases on security gives which can be associated with the information base gadget which are mechanically employed by means of different relationship in their physical exercises. Realities bases are fundamental to changed business endeavor and specialists seeking, to frame the recuperation and support of ability dependable and proficient it's cared for in an enlightening assortment. Realities base connection and substance are noticeable as large organization property that must be fastidiously guaranteed considering the way that records bases are a most cherished objective for aggressors. The fundamental wellbeing necessities of understanding base structure resemble those of various enrolling framework. Assurance, guarantee and validity of data are referenced in each movement accomplished on net. Records are taken care of in measurements base for honest and successful approach to influence control those insights. Considering the criticalness of comprehension in affiliation, it's huge to ensure roughly the information blessing in the records base. A guaranteed records base is that the one that is responded from selective possible data base assaults. Those models are obvious in assorted perspectives as they might be directing unprecedented issues with the information base security. We have dissected a network of the attacks on the off chance that you need to be attainable with its counter measures and its oversee techniques so as to be practical. Guaranteeing roughly realities base is large way of thinking for the arranging of unequivocal and request based absolutely

records base security necessities. Progress of guaranteed about and customary realities base for scattered climate is an incredibly major trouble. The basic thought riding this evaluation to perceive indisputable security inconveniences which has been talented eventually of orchestrating of an understanding base for dissipated climate. Keywords: Network, Realities, Climate, Organization, Security.

1. INTRODUCTION

Records base security is a vital development that an organization need to upgrade to have the option to run its games with no issue. The dangers address a check to the relationship to the volume unwavering quality of the data and get passage to. The peril may also outcome from unimportant accident, for instance, equipment robbery or impalpable occurrence, for example , absence of consider inside the affiliation works out. Those exercises are far accomplishing in sight of electronic business undertaking as opposed to convectional trade alongside substantial devices. There has noticeable clients been dubious to any examples of security infringement. It is besides shockingly hard to hold onto reprehensible social events who present the infringement by utilizing temperance of the partition of exchanges. Likewise, most extreme enlightening arrangement save touchy records for purchasers which can be fragile against hacking and abuse. 1.1. Database security

Records base insurance inconveniences are furthermore jumbling an immediately consequences of boundless use and utilization of dispersed customer/worker planning in inclination to incorporated pcs machine. Insights bases are a firm key guide and in this manner, plans and method must be set up. Furthermore , enlistment to the information base has been gotten more wild considering the on the web and intranets inherently , broadening the dangers of unapproved get passage to.

Some other danger to records base insurance is that of favorable circumstances stature. This is regularly where some benefactor can trade additional advantages from basic buyer over to chief through taking insights base stage programming deficiency. As an occasion , at some stage in a firm bookkeeping working environment, a customer may furthermore change abundance rights over thereto of manager and use them to frame illicit exchanges and realities. That is regularly accomplished by utilizing mistreating the thing shortcomings in the data base shape.

Various risks with a reason to be seen are unconstrained misfortunes that can show up gratitude to separating frameworks and managing systems. Different sorts of threats to insights bases could combine selection housebreaking. That is routinely the way closer to sending tends to pondering unapproved information from genuine sources. Cut value deception is some other kind of peril to records base. This is every now and again the area a private positions as some other man or lady and utilizations specialists retirement partner amount to incite out the subtleties of the holders.

Ensuring data is on the focal point of the different loosened up structures, and different customers rely upon a data base enterprise framework to control the assurance. Records bases are basic to various business venture and specialists affiliations, securing data that reengineered to shape they all the extra stunning and more melody with new and revived objectives [1]. Data base security might be a mind boggling activity that any association must

upgrade with an end goal to run its exercises with no problem. Close by these strains, organizations have extra sizeable oversee and mind their records base to live up the uprightness of the skill and assurance that their structures are obvious near the very edge of avoid purposeful infringement with the guide of interlopers.

Measurements insurance has rise as an interest for each character who is expressed with web and uses the net in any capacity, shape or shape. It's a basic it's an evident need in each segment of the development completed on the on the web . Endeavors like on-line cash exchanges, pass of delicate insights, net partnerships, and selective different games need wellbeing of data . Helpful those methodology on the on the web , records security is besides central and fundamental in instructive assortments.

Educational lists are the limitation regions where amazing mix data is dealt with. The possibility of records set separated activities and relies on unmistakable affiliations and affiliations. Taking the entire parcel underneath thought , each sort of realities needs some security to guarantee records. The degree of security depends upon the possibility of information

The insights situated aside inside the records bases are ordinarily made to factor out perspectives that help checks that need records aggregating and recovery. Tremendous bite of data are dealt with inside the shop known as insights base [2]. The UI for realities bases is known as a skill base organization structure. DBMS are an item application that interfaces with the supported customer, various applications and consequently the realities base itself to catch and tests data.

Information bases are impulsive and various data base security specialists do at this point don't have full valuation for possibility and security issues identified with unmistakable instructive records. The security incorporates restrictive kinds of controls like specific, authoritative and substantial controls. Moreover security in computerized worldwide has a first class greatness. Ensuring the non-public/delicate records set aside throughout a shop is really the enlightening arrangement security [3]. 1.2. Motivation

Security might be a crucial need in the contemporary measurements frameworks the norm. Dependably, media record a couple of type of assurance event related with the utilization of records frameworks. Despite the way that no abuse of the information has been spoken to, this function has encouraged a genuine absence of confirmation for the association and for the influenced clients, it is an uncommon infringement in their wellbeing. Conundrum or gathering. The way of development have to bring to the table working environments to shape positive roughly records towards unapproved exposure. Presently is typically gone to by access oversee fragments and kept up with the guide of the utilization of encryption strategy which may be executed to insights situated aside in basic or on optional cutoff and records being despatched over correspondence organizations.

Integrity: The game arrangement need to blast the avoiding of unapproved and senseless realities oversee. Data oversee solidifies consideration, change and erasure of comprehension . Get right of passage to control sections blast uprightness at any rate they're currently not adequate to pledge it thinking about that they can't shield customers from coming into semantically wrong insights. At something factor a buyer inserts or changes insights, this

methodology tests whether the fresh out of the box new information adjusts to the dependability necessities and denies any non-change measurements.

Availability: The arrangement need to solidify fragments to forestall and get over apparatus and programming dissatisfaction likewise as instruments to help Database wellbeing: ideas and systems perilous information get right of passage to refusals which make the information base structure hard to prevail in . Help and recuperation events help with recovering from hard-or programming dissatisfactions and avoid the absence of mastery. 2. Related work

They usually don't have particular records and it is necessitated that they'll truly get to and modify data that they're avowed. Thinking about their attributes, access control contraptions are frequently allotted into 3 directions Discretionary get section to control (DAC), work-based absolutely get admission to oversee (RBAC), and required to get passage to control (MAC). This part talks about principal proposals to getting passage to control systems and sometimes bears the cost of this preparation in the extra essential component.

2.1. Principles of Access Control Mechanisms

Early assessment inside the region of getting admission to oversee models and records wellbeing fixated in on the progress of optional and compulsory get section to oversee models. Masses of the exploration was finished concerning the social model, whose raised stage and intelligent nature for distinctly recognizing data besides persuaded the improvement of getting admission to control styles [4].

The urgent brain in getting right of passage to oversee styles are supports, subjects, and things.

2.2. Discretionary Access Control Mechanisms

Optional get right of passage to control instruments curtailed as DAC and applied in different social control frameworks change acceptance to measurements dependent at the man or lady of the point and support guidelines. Musings and methods expanded and its contemplations can in any case be found in as of late insights base structures. This at any rate would not shield a customer from enduring such support sooner or later or some other in fate on the grounds that any trouble liable for underwriting can permit another worry the support to initiate to a specific article.

This thought offers a fragmentary sales relationship between supports that is seen while directing endorsement clashes. For instance, the support offered truly to a buyer is additional express than an underwriting given to an undertaking this customer might be an individual from. Poor people underwriting is picked if the 2 supports being implied can't be examined underneath the requesting alliance.

DAC for Object-Based Database Systems: Arbitrarily complex underwriting strategies are routinely kept up and subsequently the help of substance-based absolutely support is considered as fairly true. Underwriting affiliation and application upkeep attempts are routinely confined considering the way that the contraptions are dealt with most of the way in the information base and consequently the connected support procedures aren't unfurled eventually of the apparatus applications.

2.3. Role-Based Access Control Mechanisms

Business-based enlistment control, for the first part, alluded to as RBAC, is an eventual outcome of the need to adjust affiliation underwriting and may show get right of passage to control methods of affiliations direct.

It gives as much as the course of activity of games and obligations related. All supports for a given action have respected the use this is connected

Fig. 1. Illustration of Role-Based Access Control.

The RBAC procedure revamps underwriting: at whatever point a customer should play out a particular venture or cutoff, he essentially should be given up the endorsement to accept the utilization related to the endeavor or limitation. Occupations can consolidate different positions which units up canvases the board chains of importance. Every occupation can contain a couple of consents which relates one development to at any rate one article. 2.4. Mandatory Access Control Mechanisms

A relationship inside the stunning social variant is portrayed by methods for the way that varying tuples can have unquestionable access guidelines, achieving a separating into unique insurance tasks. For the different sections, tantamount rules as figured above safeguard: a subject whose entry polish is c can watch all tuples of uses that strategy exercises alright to or significantly less than c and it might make tuples in guidelines that are sufficient to or above c.

Fig. 2. Illustration of Mandatory Access Control.

The circumstance having a security diversion plan of mystery can take a gander at any factor with a security depiction at this point don't or like mystery and easily make objects with a well-being gathering additional basic than or sufficient to the riddle. To a top-notch volume, make sports to higher classes is restricted to make certain unwavering quality.

The determination of whether the structure helps solidified or decentralized support alliance impacts a couple of segments of the gadget. Joined alliance decreases the opportunity that themes flexibly supports to subjects which ought not to get the different endorsement. This includes the inconvenience of a delayed affiliation exertion. Decentralized affiliation further offers more prominent exceptional unusualness considering the way that the semantics of support denial must be portrayed and accomplished further because of the reality of the objective of clashing supports. 2.5. Techniques for Database Security

Support is routinely one huge number of the methodologies so you can be utilized for allowing gifts or getting section to of a point directly into a framework. Some other procedure that is ground-breaking is the view. This is regularly a virtual table so one can be made at the hour of mentioning ability access. This gives reasonable wellbeing to sincere realities.

Reliability fundamental is utilized to the trademark to avoid events of data getting invalid and consequently giving deluding records. A legitimate objective of the hindrances is to live up tolerability of the data and throughout this way its consistency. Information bases are routinely guaranteed through encryption. This is consistently encoding of the framework utilizing astounding assessment that is unmistakably open while unscrambling mystery's given.

Database encryption

Integrity Constraints

T

Access control

Authorization

Techniques of database security

Flow chart

View

1

Audit Trai

Back - UD

5

Fig.3. Various techniques for database security

Another technique as an approach to be wont to make certain rough information base is that the use of gain section to power. This is routinely the in which the enlistment to the structure is essentially given coming about to affirming the abilities of the customer and fundamentally after such a test is done, the section is given. The utilization of steganography is vast in the hour of data improvement.

3. METHODOLOGY

3.1. Security in Advanced Data Management Systems

This part shows up at express insurance necessities for draining aspect data the bosses structures, this is, data the board frameworks that move past the level of the social data variant. Those structures are passed through the necessities of bleeding-edge bundles to control complex information, as an occasion, sight, and sound articles and to offer progressed records test work environments, for instance, data tunneling for information thing lodging and choice truly powerful companies. Each and every other large segment is that the proceeding to web and computerized bundles and subsequently the basic for between shape development.

3.2.Database Security: Concepts and Approaches

In an association environment, elective structures are routinely utilized which can be more reasonable for giving realities to incalculable themes. A model for this sort of system is that the free for all technique, that is at any rate called reasonable purchase. The data source gives measurements to subjects every so often or while unequivocal limits show. There's no need to express deals. Some other point is re-appropriating of understanding development to outcasts.

3.3. Explicit user authorization implicit user authorization.

An unequivocal customer perceiving verification with login name and spine chiller key is a simple methodology so it will without a totally top-notch stretch be finished. Notwithstanding, it doesn't scale in circumstances with different customers, where it actuates colossal endeavors for the association of the supports. Simultaneously as this lessens affiliation exertion considering the path that there's a modestly little entertainment plan of the way to affect be controlled, it develops the danger of coincidentally underwriting a customer that should now not be insisted.

3.4. Database Threats

Information bases these days are ascending against specific pretty attacks. Prior to depicting the techniques to ensure roughly databases, it is engaging over portray the assaults which might be done at the information bases.

Robotized recording of expertise base exchanges which incorporates touchy data should be sizeable for any educational file connection. Dating with delicate database review units will coherently find that they are at probabilities with industry and government administrative necessities. Listing, perceptible descent, and quantifiable assessment are hampered contemplating the way that there is no go with the proficient client. Overview cutoff points and responsibilities need to preferably be isolated from the two realities base heads and hence the information base worker degree to guarantee tough bundle of duties techniques.

Encrypt Databases: Spare realities fit as a fiddle as this licenses you to ensure roughly every presentation and help duplicates of databases, through then review the movement of and control enlistment to delicate realities from customers who get admission to enlightening files on the working gadget and limitation ranges. By utilizing a database investigating reachable encryption, affiliations can show and oversee customers each inside and outside of the information base.

3.5. Cryptography Based Approaches

Cryptography might be a straightforward methodology utilized for guaranteeing around insights or records from unlawful judgments. So this procedure is as often as possible utilized for guaranteeing insights base in surpassed on the biological system. This is regularly an example of encoding plain substance into figure literary substance with the assistance of fraud encryption key and cryptographic code. The troublesome trouble of this machine is to

ensure ROUGHLY keys from assailants.

3.6. Other Security Approaches

Fernandez et al have been presented a number of insurance plans for realities base assurance [5].To tackle the data consistency inconvenience in the dispersed educational file each other Intrusion Tolerance Quorum framework [ITOS] has been proposed [6]. A bearing of movement-based completely streamed structure security stage has been additionally evolved in [7] which depends upon an area language for investigating perceive wellbeing for scattered database gadgets. CORBA basically based investigation security form has been proposed.

4.RESULT AND DISCUSSION 4.1. Requirements for Database Security

Customer endorsement and perceiving affirmation are naturally required sooner than the buyer can get to the information base. Attestation methods are passwords, biometric perusers, or engraving assessment units. These are needed for the higher boss of clients. There must be a right diversion plan of guidelines in real life that shields the database from harmful demolitions. Examining is some other significant information base. This requests that a record of activities sorting out with tasks.

Fig.4. Database Security

4.2. Process of creating database

We security in records base is oftentimes improved through an example of making planning framework. There is an example of keeping up and creating a security plan. A through an entire study of the database biological system ought to be finished. That is frequently to see any social creation plans openings too firewall shortcomings. Specialists are commonly gotten to get chances, depict the opportunity of a risk of a resource and pick the estimation of any such peril to the resources. At something factor this is consistently done, the resulting degree is to return up a measure to murder those threats.

4.4. Security issues and Challenges

> The implementation of a secured distributed database system has been emerged number of critical issues. Some of these are as follows:

> Identify the methodology which can be used to assess the security level in any system

> The system has an approach to Monitoring the system security.

> Data can be distributed over secure communication network which can be Integrate some techniques like Cryptography etc.

> Using middle ware approaches for security of distributed system.

4.5. Control methods for database threats

To dispose of the assurance dangers each alliance must incorporate a security technique that must be acknowledged unquestionably. Insecurity procedure affirmation acknowledges an urgent business considering the way that, in such a case that check is fitting then there might be fewer odds of dangers. Special customers have assorted permission rights on one kind of insights base article. Get admission to control Mechanisms administer managing the path rights. It is the central way to deal with structure positively roughly the information contraptions inside the records bases and is kept up by a long shot limit of the DBMS [8].

4.6. User Identification / Authentication

Buyers are routinely approved from unprecedented perspectives before they're permitted to shape insights base. Records base endorsement melds every last one-of-a-sort proof and affirmation of customers. Outer affirmation is regularly done by utilizing the running shape or affiliation organization. To make certain security, the individual is insisted and it keeps up the delicate data quiet and from being changed through the unapproved buyers.

The aggressor can get various methodologies like redirection endorsement, Default Password, advantage expanding, Password Guessing through animal weight, and rainbow attack when they attempt to bargain supporter id and affirmation [2].

4.7. Accountability and auditing

Evaluating is that the checking and recording of arranged database brandishing exercises, from every database clients and non-measurements base customers. Bookkeeping is that the course is closer to holding a study way for customer practices on the shape. Commitment and review tests are depended upon to guarantee real dependability of the information which wishes depicted enlistment to the educational records that are controlled through surveying and for keeping up the insights.

4.8. Encryption

Encryption is that the way closer to changing over realities directly into a code or a code so it can't be conceivable to regardless of others from the people that keep up a key for the code text. The code text or encoded printed content is called blended data.

There are states for realities affirmation in the educational file. Encoding can fathom a portion of the issues related to data very still.

4.9. Principles of integrity and reliability in database security

Measurements bases amalgamate realities from assorted assets, and customers imagine that a DBMS has to bring to the table enlistment to the information for the term of a strong way. Accurately when programming engineers unequivocal that thing has resolute

decent, they gather that the item runs for wide time frames without coming up short. Clients truly imagine that a DBMS should be trustworthy, in light of the fact that the data by the method of and colossal are essential to big business or imaginative wishes. Additionally, clients depend on their data on a DBMS and appropriately imagine that it has to monitor the information from occurrence or harm.

The external signal £t falls to a certain interval, the pure strategy Bayesian Nash Equilibrium will switch from one to another over time,

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

(i) In stage i, if the PSBNE {I, (H,H)} occurs and Ei e [o. ¿-^^-^q), the PSBNE will switch to {NI, (H,H)} in stage i + 1.

(ii) In stage i, if the PSBNE {NI, (H,H)} occurs and £t e (¿^-^ir^l], the PSBNE will switch to {I, (H,H)} in stage i + 1 as long as i - p > i - pD > 0.

(iii) In stage i, if the PSBNE {I, (NH,H)} occurs and st e [0, ^i'^D^-^q) the PSBNE will switch to {I, (NH,H)} will disappear in stage + 1.

(iv) In stage i, if st e — a new PSBNE will emerge as {I, (NH,H)} in stage i+1 as long as i- B' > 0,i- BD <0.

This above conditions (i) - (iv) implies that under a certain signal strength, the equilibrium strategy profiles of the firm and the hackers will not be stable when the game is played repeatedly over time. Condition (i) indicates that when the signal strength is small enough

et e -qt) , the firm will choose to forgo investigation in the following stage,

but the hackers will keep hacking . In other words, when the firm perceives a strong signal of international hackings, the firm will choose to not investigate to save cost. Condition (ii) states that when the hackers can receive net benefit and the external signal is large enough

£t e (-¿rz^-^ql the firm will choose to investigate in the following stage and the

hackers will keep hacking.

This finding is counterintuitive; however, when a string signal indicates more domestic hackers, the firm is better off investigating to catch hackers, as well as recover some damages to reduce losses, even if the hackers will gain positive net benefits. Interestingly,

condition (iii) shows that when the external signal is small enough st e [o, ^i—d^ - ^~-~qt) ,

the previous PSBNE {I, (NH,H)} will disappear. In the previous stage, the firm chose to investigate and domestic hackers chose not to hack due to severe deterrence - B1 >0,i-B D < 0 . However, when the firm observes there will be a large proportion of international hacking, the firm will choose to stop investigation to save costa and domestic hackers will switch hack to attack; accordingly, equilibrium cannot converges. It illustrates that when the

firm perceives a strong signal of domestic hackings st e -^^ql , the firm will be

able to effectively prevent domestic cyber attacks in the following stage, as long as domestic hackers receive heavy punishment i- B1 > 0,i- BD < 0.

By analyzing the equilibrium switching from time , the external signal st is unlikely to help the firm to effectively prevent international hackers, no matter how strong or weak the signal. Since et essentially updates the firm's prior belief of the hackers type. However with the help of external signals, the firm could learn how to respond strategically to the hackers.

5. CONCLUSION

Records base security is actually now not an exceptional issue of educational assortment in any case it is an extreme and quick framework issue. Some of the thought for optional and required insurance models for the affirmation of ordinary realities bases are provided. Security can be a major issue in reality base organization when you consider that measurements set aside in an educational assortment is unquestionably colossal and heaps of time, remarkably tricky part. Information base security paper has attempted to watch the issue of dangers with a reason to be set up to enlightening assortment structure. These are important for the absence of spine-chiller anyway absence of uprightness. Which the paper has regularly talked about the information base security concerns and assessment with respect to assorted inconveniences comprising of the region. Realities base assurance research paper has attempted to find the issues of dangers so as to be set up to information base shape.

REFERENCE

[1] "Security in Computing" 4th edition Mr.Charles P.Pfleeger-Pfleeger Consulting Group, Shari Lawrence Pfleeger.

[2] Mr. Saurabh Kulkarni, Dr. Siddhaling Urolagin, Review of Attacks on Databases and Database Security Techniques, Facility International Journal of Engineering Technology and Database Security Techniques Research, Volume 2, Issue 11, November-2012.

[3] Sohail IMRAN, Dr Irfan Hyder, Security Issues in Database, Second International Conference on Future Information Technology and Management Engineering, 2009.

[4] E. Bertino and R. Sandhu. Database security - concepts, approaches, and challenges. Dependable and Secure Computing, IEEE Transactions on, 2(1):2-19, Jan.- March 2005.

[5] E. B. Fernandez, K. Falkner, Securing Distributed systems using patterns: a survey, Computers and Security ,in press, http://dx.doi,org/10.1016/j.cose.2012.04.005

[6] H. Zhou, X. Meng, L. Zhang, X. Oiao, Quorum systems for intrusion tolerance based on trusted timely computing base, Journal of Sys-tems, Engineering and Electronics, vol 21, no.1 pp.168-174,2010.

[7] H. Hamdi, M.Mosbah, A DSL framework for policy based security of distributed systems, 3rd IEEE International Conference on Secure Software Integration and Reliability Improvements, pp.150-158, 2009.

[8] Deepika, Nitasha Soni, Database Security: Threats and Security Techniques, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 5, May 2015.

i Надоели баннеры? Вы всегда можете отключить рекламу.