Security and inference in multilevel database and knowledge-base systems
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
Database security
Network security: private communication in a public world
Network security: private communication in a public world
How to do discretionary access control using roles
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Oracle security
Communications of the ACM
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
A note on the confinement problem
Communications of the ACM
Cryptography and data security
Cryptography and data security
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
Oracle Security Handbook
XMl Security
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
Incorporating security components into database courses
Proceedings of the 1st annual conference on Information security curriculum development
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Using animation courseware in the teaching of database security
Proceedings of the 8th ACM SIGITE conference on Information technology education
SEED: A Suite of Instructional Laboratories for Computer Security Education
Journal on Educational Resources in Computing (JERIC)
Incorporating database security courseware into a database security class
Proceedings of the 4th annual conference on Information security curriculum development
Hi-index | 0.00 |
Database security has paramount importance in industrial, civilian and government domains. Despite its importance, our search reveals that only a small number of database security courses are being offered. In this paper, we share our experience in developing and offering an undergraduate elective course on database security with limited resources. We believe that database security should be considered in its entirety rather than being component specific. Therefore, we emphasize that students develop and implement a database security plan for a typical real world application. In addition to the key theoretical concepts, students obtain hands-on experience with two popular database systems. We encourage students to learn independently making use of the documentation and technical resources freely available on the Internet. This way, our hope is that they will be able to adapt to emerging systems and application scenarios.