Towards assessing the security of DBMS configurations | IEEE Conference Publication | IEEE Xplore