Security and Auditing Protection Method for Statistical Database

نویسندگان

  • Jiayi Yao
  • Runtong Zhang
چکیده

According to the statistical data security and auditing requirement, an effective Security Protection Method and a Rules-based Statistical Data Auditing (RSDA) solution are given. In this article, we introduce the classification and expression of statistical auditing rule.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computational complexity of auditing finite attributes in statistical databases

We study the computational complexity of auditing finite attributes in databases allowing statistical queries. Given a database that supports statistical queries, the auditing problem is to check whether an attribute can be completely determined or not from a given set of statistical information. Some restricted cases of this problem have been investigated earlier, e.g. the complexity of statis...

متن کامل

Detection of Malicious User in Oracle 10g DBMS and Cost of Elimination

One major difficulty faced by organizations is the protection of data against malicious access. Six security mechanisms, namely, authentication, authorization, access control, auditing, encryption and integrity control are available in Oracle 10g database management systems (DBMS). These are implemented for protecting data. These typical database security mechanisms are not able to detect and h...

متن کامل

Critical Assessment of Auditing Contributions to Effective and Efficient Security in Database Systems

Database auditing has become a very crucial aspect of security as organisations increase their adoption of database management systems (DBMS) as major asset that keeps, maintain and monitor sensitive information. Database auditing is the group of activities involved in observing a set of stored data in order to be aware of the actions of users. The work presented here outlines the main auditing...

متن کامل

Compliance with data protection laws using Hippocratic Database active enforcement and auditing

C. M. Johnson T. W. A. Grandison Governments worldwide are enacting data protection laws that restrict the disclosure and processing of personal information. These laws impose administrative and financial burdens on companies that manage personal information and may hinder the legitimate and valuable sharing and analysis of this information. In this paper we describe an integrated set of techno...

متن کامل

Database Auditing Design on Historical Data

Database Auditing is one of the major issues in information security. Lack of data auditing leads the business applications to the lost trail of business processes. To cope with auditing, historical data or temporal database is needed in order to track operations and actors of the operation with the time. Valid and transaction times are two major timestamps in temporal database. In this paper, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005