Overview of Database Architecture and Security Measures – Attacks and Control Methods

Authors

  • Otusile Oluwabukola Computer Science Department, School of Computing and Engineering Sciences Babcock University, Ilishan Remo, Ogun State
  • S A Idowu Computer Science Department, School of Computing and Engineering Sciences Babcock University, Ilishan Remo, Ogun State
  • Ajayi Adebowale Computer Science Department, School of Computing and Engineering Sciences Babcock University, Ilishan Remo, Ogun State

Keywords:

Database, Database-Management System (DBMS), Database Architecture, security

Abstract

In this paper, we describe the different database architecture and security measures. The architecture of a database system is greatly influenced by the underlying computer system on which the database system runs. Database systems can be centralized, where one server machine executes operations on the database. Database systems can also be designed to exploit parallel computer architectures. Distributed databases span multiple geographically separated machines. Ensuring the security of databases is also a complex issue when discussing database architecture. The purpose of this paper is to highlight and identify the architectures of database systems running on server systems, which are used in centralized and client–server architectures and the security measures pertaining to database systems.

 

 

References

Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database Concept, McGraw-Hill, New York, 2006

Burtescu, E. “Problems of Inference in Databases in Education, Research & Business Technologiesâ€, in Proceeding of the 9th International Conference on Economic Informatics, INFOREC Printing House, Bucharest, 2009.

Burtescu, E, “Databse security in Knowledge Management. Projects, Systems and Technologiesâ€, International Conference Knowledge Management. Projects, Systems and Technologies, INFOREC Printing House, Bucharest, November 9-10, 2006.

Hsiao, S.B. and Stemp, R, “Computer Security, course, CS 460†Monterey, California, 1995.

McCarthy, L, IT Security: Risking the Corporation, Prentice Hall PTR, 2003

Proctor, P.E. and Byrnes, F.C. (2002). The Secured Enterprise, Prentice Hall PTR, 2002

Security Complete. Second Edition, SYBEX Inc, 2002.

Harder, T., Reuter, A., “Concepts for implementing a centralized database management systemâ€, In Proceedings of International Computing Symposium on Application Systems Development, March 1983

Reuter, A., 2005. Databases: the integrative force in cyberspace. In: Data Management in a Connected World, LNCS 3551. Springer Verlag, pp. 3e16, 2005.

Benyon D. Information and Data-Modelling (2nd. Edition), Mc Graw Hill, 1997.

C.J. Introduction to Database Systems (6th Edition), Addison- Wesley Publ. company, 1995.

Elmaseri, K. and Navathe, D. Fundamentals of Database Systems (2nd. Edition), Benjamin / Cumming, 1994.

Ullmann & Widom, S. A First Course in Database Systems, Prentice Hall, 1997.

Joseph M. Hellerstein, Michael Stonebraker and James Hamilton, Architecture of a Database System Foundations and Trends_ in Databases Vol. 1, No. 2 pp 141–259, 2007.

Downloads

Published

2014-04-13

How to Cite

Oluwabukola, O., Idowu, S. A., & Adebowale, A. (2014). Overview of Database Architecture and Security Measures – Attacks and Control Methods. Asian Journal of Computer and Information Systems, 2(2). Retrieved from https://ajouronline.com/index.php/AJCIS/article/view/759

Issue

Section

Articles