Annotated Bibliography: Database Security

Pages: 4 (975 words)  ·  Bibliography Sources: 5  ·  Level: Master's  ·  Topic: Education - Computers  ·  Buy This Paper

¶ … Security Issues and Features of Database Management Systems (Feeney, 1986) the author creates a taxonomy and framework to support his contention that while a distributed database architecture creates new security problems or challenges, these can be met and overcome through use of three core technologies. The author also provides insights into how the traditional database management systems (DBMS) taxonomies and data structures will also be expanded to support user identification and authorization across entire network-based platforms. The author covers the existing areas of user identification and authorization, incorporating an analysis of how views and assertions in database architecture have the potential to authenticate network-based users globally. While the author only briefly touches on the area of role-based authentication throughout a network, there is significant potential for that area for future research. In addition, the author mentions the area of access rules and grant rights, providing examples of how to they are used in single-instance database deployments. These concepts can potentially be extrapolated to broader, more enterprise-wise security strategy using broader database architectures based on the data provided in this article.

In the article Database Security (Fulkerson, Gonsoulin, Walz, 2002) the authors use the implementation of a Microsoft Access database in a manufacturing environment to provide insights into how database security can be made more effective. The purpose in using a stand-alone database is to show how polices regarding confidentiality can be created by view within a database structure, taking into account authorization and user access management. This article does show graphically hwo to define roles and security properties associated with each in Microsoft Access. For purposes of example it is effective, yet the majority of enterprise systems being used in a role-based and group-based environment are Oracle databases today. The authors also provide an overview of how to define rules and ensure database integrity by role and group within an Access database. This is useful from an instructional standpoint and serves as a foundation for showing how the creation of a security plan is essential for the successful management of an enterprise database. With hands-on examples of how to create a database security options and defining role-based and group-based definitions, this article provides pragmatic insights into database security.

Authors Harris and Sidwell provide insightful analysis of security for distributed database architectures and data models in the article and supporting research in Distributed Database Security. The authors contend that as distributed database architectures migrate from mainframe and legacy-based platforms the complexity and difficulty of database integration often leads to gap in security levels and the need for a more focused series of strategies on securing these heterogeneous, distributed database environments. The authors analyze the implications of integrating to legacy and often proprietary databases using the concepts of distributed role-based, group-based and workflow-specific distributed authentication services. Also included are analyses of network and secured remote database administration, two areas that enterprises are increasingly concerned about given the… [END OF PREVIEW]

Database Security Design of an Online Membership Term Paper

Database Security and SQL Injection Research Proposal

Database Security Research Paper

Database Security Annotated Bibliography

Database Security Article Review

View 1,000+ other related papers  >>

Cite This Annotated Bibliography:

APA Format

Database Security.  (2012, September 23).  Retrieved August 22, 2019, from

MLA Format

"Database Security."  23 September 2012.  Web.  22 August 2019. <>.

Chicago Format

"Database Security."  September 23, 2012.  Accessed August 22, 2019.