IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Gaps in Databases: A Comparison of Alternative Software Products for Web Applications Support

Security Gaps in Databases: A Comparison of Alternative Software Products for Web Applications Support
View Sample PDF
Author(s): Afonso Araújo Neto (University of Coimbra, Portugal)and Marco Vieira (University of Coimbra, Portugal)
Copyright: 2013
Pages: 21
Source title: Developing and Evaluating Security-Aware Software Systems
Source Author(s)/Editor(s): Khaled M. Khan (Qatar University, Qatar)
DOI: 10.4018/978-1-4666-2482-5.ch006

Purchase

View Security Gaps in Databases: A Comparison of Alternative Software Products for Web Applications Support on the publisher's website for pricing and purchasing information.

Abstract

When deploying database-centric web applications, administrators should pay special attention to database security requirements. Acknowledging this, Database Management Systems (DBMS) implement several security mechanisms that help Database Administrators (DBAs) making their installations secure. However, different software products offer different sets of mechanisms, making the task of selecting the adequate package for a given installation quite hard. This paper proposes a methodology for detecting database security gaps. This methodology is based on a comprehensive list of security mechanisms (derived from widely accepted security best practices), which was used to perform a gap analysis of the security features of seven software packages composed by widely used products, including four DBMS engines and two Operating Systems (OS). The goal is to understand how much each software package helps developers and administrators to actually accomplish the security tasks that are expected from them. Results show that while there is a common set of security mechanisms that is implemented by most packages, there is another set of security tasks that have no support at all in any of the packages.

Related Content

Babita Srivastava. © 2024. 21 pages.
Sakuntala Rao, Shalini Chandra, Dhrupad Mathur. © 2024. 27 pages.
Satya Sekhar Venkata Gudimetla, Naveen Tirumalaraju. © 2024. 24 pages.
Neeta Baporikar. © 2024. 23 pages.
Shankar Subramanian Subramanian, Amritha Subhayan Krishnan, Arumugam Seetharaman. © 2024. 35 pages.
Charu Banga, Farhan Ujager. © 2024. 24 pages.
Munir Ahmad. © 2024. 27 pages.
Body Bottom