publication . Part of book or chapter of book . Article . 1999

Oracle Database Security

Mary Ann Davidson;
Restricted
  • Published: 08 Nov 1999
  • Publisher: Apress
Abstract
This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user accounts that require a login password to be authenticated to access the data.
Subjects
free text keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control, Database server, PL/SQL, computer.programming_language, computer, Database security, Relational database management system, computer.software_genre, Oracle, Oracle Unified Method, Computer science, Database, Identity column, Database administrator, Computer security model, Strong authentication, Cloud computing security, Database schema, Security service, Security information and event management, Computer security, Internet privacy, business.industry, business, Oracle database, Oracle machine
Related Organizations

1. Ron Ben Natan - “Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase”, Digital Press, May 02, 2005;

2. Pete Finnigan - “Oracle Security Step-by-Step”, SANS Press, April, 2004; 3. Arup Nanda, Donald Burleson - “Oracle Privacy Security Auditing: Includes Federal Law Compliance with HIPAA, Sarbanes Oxley & The Gramm Leach Bliley Act GLB (Oracle In-Focus series)”, Rampant Techpress, December 01, 2003;

4. John Abel - “Oracle E-Business Security Suite (Osborne ORACLE Press Series)”, McGraw-Hill Osborne mass-media, 1 edition, August 08, 2008; 5. http://www.oracle.com/ro/technologies/security/index.html.

Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue