By Topic

Secure database management systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Feikis, J. ; DeVry Inst. of Technol., Lombard, IL, USA

Information is a very critical asset in today's organizations. Organizations use database systems and the information within them to automate various functions. Due to its importance, information protection is a critical component of the database management system (DBMS). Information protection is the goal of a secure DBMS. When designing such a system, tradeoffs between operating environment, economic considerations and performance must be made. Secure DBMSs, if built too securely, can become too costly and too difficult to use. This may discourage the organization from using the system, thus rendering it useless. A secure DBMS should be user-friendly, perform operations quickly and maintain data secrecy during all transactions. The system should be flexible enough to support the organization's changing needs while still meeting its security requirements. When designing a secure DBMS, the entire environment must be considered. The level of security provided by any secure DBMS is only as good as its weakest link

Published in:

Potentials, IEEE  (Volume:18 ,  Issue: 1 )