Professional Documents
Culture Documents
Chapter30 Database Security
Chapter30 Database Security
Navathe
CHAPTER 30
Database Security
Figure 30.3 The PERSON relation schema for illustrating statistical database security
Figure 30.4 Oracle label security architecture. Data from: Oracle (2007)
Copyright © 2016 Ramez Elmasri and Shamkant B. Navathe Slide 30- 44
How Data Labels and User Labels
Work Together
Figure 30.5 Data labels and user labels in Oracle. Data from: Oracle (2007)
Copyright © 2016 Ramez Elmasri and Shamkant B. Navathe Slide 30- 45
30.11 Summary
Threats to databases
Types of control measures
Access control
Inference control
Flow control
Encryption
Mandatory access control
SQL injection
Key-based infrastructures