Providing security in a phone book database using triggers | IEEE Conference Publication | IEEE Xplore