Chapter 6. Database Security

In this chapter:

  • Integrity for databases: record integrity, data correctness, update integrity

  • Security for databases: access control, inference, and aggregation

  • Multilevel secure databases: partitioned, cryptographically sealed, filtered

Protecting data is at the heart of many secure systems, and many users (people, programs, or systems) rely on a database management system (DBMS) to manage the protection. For this reason, we devote this chapter to the security of database management systems, as an example of how application security can be designed and implemented for a specific task. There is substantial current interest in DBMS security because databases are newer than programming and operating systems. Databases ...

Get Security in Computing, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.