An Appraisal to Assess the Security of Database Configurations



Database Management Systems (DBMS) have a long tradition in high security and several mechanisms needed to protect data have been proposed/consolidated in the database arena. However, the effectiveness of those mechanisms is very dependent on the actual configuration chosen by the database administrator. Tuning a large database is quite complex and achieving high security is a very difficult task that requires a lot of expertise and continuous and proactive work. In this paper we present an assessment tool aimed at evaluating the security of DBMS configurations. The proposed tool is simple and effective, and can be used by administrators with very little security knowledge. We evaluate the tool by performing the assessment of four different real database installations based on four well-known and widely used DBMS engines.


Computer security


International Conference on Dependability (DEPEND 2009), June 2009

Cited by

Year 2013 : 1 citations

 Dilip kumar Choubey, Joy Bhattacharjee, Roopali Soni, "“Loss Minimization of Web Databases by Fine Grain Approach", International Journal of Engineering Research and Applications (IJERA), Vol. 3 Issue 1, January-February 2013.

Year 2012 : 2 citations

 Neera Batra, Hemant Aggarwal, "Autonomous Multilevel Policy Based Security tonomous Multilevel Policy Based Security Configuration in Distributed Database", International Journal of Computer Science Issues (IJCSI), Vol. 9 Issue 6 No 2, November 2012.

 Dilip kumar Choubey, Roopali Soni, Joy Bhattacharjee, "Privacy protection and fine grained access control to web database", IRNetExplore, India, 2012.

Year 2011 : 1 citations

 Jianwu Zhang, Guoai Xu, Yixian Yang, Shize Guo, "A method for system auditing based on baseline assessment", IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, May 27-29, 2011.