Documente Academic
Documente Profesional
Documente Cultură
Navathe
CHAPTER 30
Database Security
Figure 30.3 The PERSON relation schema for illustrating statistical database security
Figure 30.4 Oracle label security architecture. Data from: Oracle (2007)
Copyright © 2016 Ramez Elmasri and Shamkant B. Navathe Slide 30- 44
How Data Labels and User Labels
Work Together
Figure 30.5 Data labels and user labels in Oracle. Data from: Oracle (2007)
Copyright © 2016 Ramez Elmasri and Shamkant B. Navathe Slide 30- 45
30.11 Summary
Threats to databases
Types of control measures
Access control
Inference control
Flow control
Encryption
Mandatory access control
SQL injection
Key-based infrastructures