Database and Database Application Security

被引:0
|
作者
Said, Huwida [1 ]
Guimaraes, Mario [1 ]
Maamar, Zakaria [1 ]
Jololian, Leon [1 ]
机构
[1] Zayed Univ, Coll Informat Technol, Dubai, U Arab Emirates
关键词
SQL; DBA; DBMS; Database security; database application security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper focuses on the emerging importance of database and application security, textbooks and other supplementary materials to teach these topics and where to place these topics in a curriculum. The paper emphasizes 1) the growing concerns of database technologies and database applications, 2) existing books and supporting materials, and 3) and Zayed University's approach to teaching these topics. At Zayed, we incorporate database and database application security in two different courses.
引用
收藏
页码:90 / 93
页数:4
相关论文
共 50 条
  • [41] Object Normal Form, Fourth Normal Form and Their Application to Database Security
    Link, Sebastian
    [J]. CONCEPTUAL MODELING (ER 2022), 2022, 13607 : 349 - 364
  • [42] Inter-network access to database based on database security proxy
    Li, Bo
    Chen, Maoyuan
    Gu, Fengqiang
    [J]. Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2010, 34 (09): : 103 - 105
  • [43] Privacy preserving database generation for database application testing
    Wu, Xintao
    Wang, Yongge
    Guo, Songtao
    Zheng, Yuliang
    [J]. FUNDAMENTA INFORMATICAE, 2007, 78 (04) : 595 - 612
  • [44] DATABASE SKELETON AND ITS APPLICATION TO LOGICAL DATABASE SYNTHESIS
    CHANG, SK
    CHENG, WH
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1978, 4 (01) : 18 - 30
  • [45] Research on the Security Based on Web Database
    Ren, Hua
    [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 115 - 119
  • [46] Implementing security on a prototype hospital database
    Khair, M
    Pangalos, G
    Andria, F
    Bozios, L
    [J]. MEDICAL INFORMATICS EUROPE '97: PARTS A & B, 1997, 43 : 176 - 180
  • [47] A Formal Multilevel Database Security Model
    Wang Baohua
    Ma Xinqiang
    Li Danning
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 815 - +
  • [48] A new comparative study of database security
    Barbulescu, Daniel
    Enache-Ducoffe, Adriana-Cristina
    Togan, Mihai
    [J]. ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2023, 33 (03): : 17 - 28
  • [49] Security Workflow Model for Database Storage
    Yuan, Hui
    Zheng, Lei
    Peng, Xiangli
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2017), 2017, 74 : 288 - 293
  • [50] A security specification library with a schemaless database
    Morimoto, Shoichi
    Cheng, Jingde
    [J]. COMPUTATIONAL SCIENCE - ICCS 2007, PT 3, PROCEEDINGS, 2007, 4489 : 890 - +