Kernelized Database Systems Security

Kernelized Database Systems Security

Ramzi A. Haraty
Copyright: © 2005 |Pages: 4
ISBN13: 9781591405603|ISBN10: 1591405602|EISBN13: 9781591407959
DOI: 10.4018/978-1-59140-560-3.ch052
Cite Chapter Cite Chapter

MLA

Haraty, Ramzi A. "Kernelized Database Systems Security." Encyclopedia of Database Technologies and Applications, edited by Laura C. Rivero, et al., IGI Global, 2005, pp. 304-307. https://doi.org/10.4018/978-1-59140-560-3.ch052

APA

Haraty, R. A. (2005). Kernelized Database Systems Security. In L. Rivero, J. Doorn, & V. Ferraggine (Eds.), Encyclopedia of Database Technologies and Applications (pp. 304-307). IGI Global. https://doi.org/10.4018/978-1-59140-560-3.ch052

Chicago

Haraty, Ramzi A. "Kernelized Database Systems Security." In Encyclopedia of Database Technologies and Applications, edited by Laura C. Rivero, Jorge Horacio Doorn, and Viviana E. Ferraggine, 304-307. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-560-3.ch052

Export Reference

Mendeley
Favorite

Abstract

There are two main types of security in database systems: discretionary security and mandatory security. Discretionary security restricts access to data items at the discretion of the owner. Most commercial database management systems (DBMS) employ some form of discretionary security by controlling access privileges and modes of data users (Griffiths & Wade, 1976). Discretionary security is not adequate in a multilevel secure environment, however, because it does not prevent Trojan horse attacks and provides a low level of assurance. Mandatory security, on the other hand, restricts access of data items to cleared database users. It is widely exploited in military applications and provides a high assurance.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.