Overview of Database Architecture and Security Measures – Attacks and Control Methods
Keywords:
Database, Database-Management System (DBMS), Database Architecture, securityAbstract
In this paper, we describe the different database architecture and security measures. The architecture of a database system is greatly influenced by the underlying computer system on which the database system runs. Database systems can be centralized, where one server machine executes operations on the database. Database systems can also be designed to exploit parallel computer architectures. Distributed databases span multiple geographically separated machines. Ensuring the security of databases is also a complex issue when discussing database architecture. The purpose of this paper is to highlight and identify the architectures of database systems running on server systems, which are used in centralized and client–server architectures and the security measures pertaining to database systems.
Â
Â
References
Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database Concept, McGraw-Hill, New York, 2006
Burtescu, E. “Problems of Inference in Databases in Education, Research & Business Technologiesâ€, in Proceeding of the 9th International Conference on Economic Informatics, INFOREC Printing House, Bucharest, 2009.
Burtescu, E, “Databse security in Knowledge Management. Projects, Systems and Technologiesâ€, International Conference Knowledge Management. Projects, Systems and Technologies, INFOREC Printing House, Bucharest, November 9-10, 2006.
Hsiao, S.B. and Stemp, R, “Computer Security, course, CS 460†Monterey, California, 1995.
McCarthy, L, IT Security: Risking the Corporation, Prentice Hall PTR, 2003
Proctor, P.E. and Byrnes, F.C. (2002). The Secured Enterprise, Prentice Hall PTR, 2002
Security Complete. Second Edition, SYBEX Inc, 2002.
Harder, T., Reuter, A., “Concepts for implementing a centralized database management systemâ€, In Proceedings of International Computing Symposium on Application Systems Development, March 1983
Reuter, A., 2005. Databases: the integrative force in cyberspace. In: Data Management in a Connected World, LNCS 3551. Springer Verlag, pp. 3e16, 2005.
Benyon D. Information and Data-Modelling (2nd. Edition), Mc Graw Hill, 1997.
C.J. Introduction to Database Systems (6th Edition), Addison- Wesley Publ. company, 1995.
Elmaseri, K. and Navathe, D. Fundamentals of Database Systems (2nd. Edition), Benjamin / Cumming, 1994.
Ullmann & Widom, S. A First Course in Database Systems, Prentice Hall, 1997.
Joseph M. Hellerstein, Michael Stonebraker and James Hamilton, Architecture of a Database System Foundations and Trends_ in Databases Vol. 1, No. 2 pp 141–259, 2007.
Downloads
Published
Issue
Section
License
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.