Database Security

Vineet Patel
Vineet Patel
Akanksha Kulkarni
Akanksha Kulkarni

Send Message

To: Author

Database Security

Article Fingerprint

ReserarchID

CSTNWS2OZ07

Database Security Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu
Font Type
Font Size
Font Size
Bedground

Abstract

A database management system is frequently used by users to handle data protection, which is at the core of many security systems. The security of database management systems is the main topic of this essay, which serves as an illustration of how application security may be planned and implemented for certain tasks. Due to the fact that databases are more recent than programming languages and operating systems, there is currently a lot of interest in DBMS Security. Many commercial and governmental organizations depend on databases because they store data in a way that makes retrieving and maintaining it simple and effective. Because databases are a favorite target for attackers, their structure and contents are regarded as significant company assets that must be carefully protected. Similar to other computing systems, databases have some fundamental security requirements. Access control, excluding erroneous data, user authentication, and reliability are the main issues. The problems and dangers to database security are discussed in this paper.

Generating HTML Viewer...

References

14 Cites in Article
  1. (2002). Pfleeger, Shari Lawrence.
  2. E Bertino,R Sandhu (2005). Database security - concepts, approaches, and challenges.
  3. Ushveen Kaur,Nitya Chutani,Pragun Handa (2009). E-learning for Undergraduate Students Amid The Pandemic: Teachers' Perspective.
  4. S Sumanthi (2007). Fundamentals of relational database management systems Berlin.
  5. Emil Rurtescu (2009). DATABASE SECURITY ATTACKS AND CONTROL MET] IODS.
  6. M Murray,Coffin (2010). Database Security: What Students Need to Kpow.
  7. Andriy Furmanyuk,Mykola Karpinskyy,Bohdan Borowik (2007). Modern Approaches to the Database Protection.
  8. Aziah Asmawi,Zailani Sidek,Shukor Razak (2008). System architecture for SQL injection and insider misuse detection system for DBMS.
  9. (2007). Unknown Title.
  10. Mariupi (2014). Principles of security and integrity of databases.
  11. M Karabatak,T Mustafa (2018). Performance comparison of classifiers on reduced phishing website dataset.
  12. R Agrawal,R Srikant,Y Xu (2002). Database technologies for electronic commerce.
  13. P Ambhore,B Meshram,V Waghmare A Implementation of Object Oriented Database Security.
  14. A Unknown Title.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Vineet Patel. 2026. \u201cDatabase Security\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 23 (GJCST Volume 23 Issue E2).

Download Citation

Secure database management and data protection strategies.
Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-E Classification (LCC): QA76.9 .A25 D33
Version of record

v1.2

Issue date
October 4, 2023

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 1994
Total Downloads: 55
2026 Trends
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Database Security

Vineet Patel
Vineet Patel
Akanksha Kulkarni
Akanksha Kulkarni

Research Journals