Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1562877.1562909acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
research-article

Database and database application security

Published: 06 July 2009 Publication History

Abstract

This paper focuses on the emerging importance of database and application security, textbooks and other supplementary materials to teach these topics and where to place these topics in a curriculum. The paper emphasizes 1) the growing concerns of database technologies and database applications, 2) existing books and supporting materials, and 3) and Zayed University's approach to teaching these topics. At Zayed, we incorporate database and database application security in two different courses.

References

[1]
Knox, David (2004), Effective Oracle Database 10g Security by Design, McGraw-Hill. ISBN 0-07-223130-0
[2]
Eric Marvets, "Microsoft Security Summit", April 13, 2005, Atlanta, Georgia
[3]
RSM McGladry, The Ultra-Secure Network Architecture, Retrieved on January 16, 2009 from
[4]
http://www.rsmmcgladrey.com/RSM-Resources/Articles/Ultra-Secure/
[5]
IBM, Firewalls and demilitarized zone (DMZ) configurations, Retrieved on January 16, 2009 from http://publib.boulder.ibm.com/infocenter/wasinfo/v4r0/index.jsp?topic=/com.ibm.websphere.v4.doc/wasa_content/070104.html.
[6]
Afyouni, Hassan A. (2006), Database Security and Auditing, Thompson Course Technology, 0-619-21559-4.
[7]
Litchfield, "The Database Hacker's Handbook: Defending Database Servers", http://www.amazon.com/gp/reader/0764578014/ref=sib_dp_pop_toc?ie=UTF8&p=S00C#
[8]
Marlene Theriault&William Heney, http://oreilly.com/catalog/orasec/chapter/ch07.html Oracle Security.
[9]
Charles P. Pfleeger, Shari Lawrence Pfleeger, Security in Computing, Prentice Hall, ISBN-10: 0132390779, October 2006. 4th ed.
[10]
Michael Howard, David LeBlanc, Writing Secure Code, Microsoft Press, 2nd edition, 2003, 2nd edition, ISBN n. 0-7356-1722-8.
[11]
Natan, Ron Ben (2005), Implementing Database Security and Auditing, Elsevier Digital Press, 1-5558-334-2, 2005.
[12]
Finnigan, Pete. Oracle Security Step-by-Step, SANS Press, v. 2, 2004.
[13]
Aboelela, Emad, "NET-SEAL, Teaching Computer Networks Through Simulation Experiments and Animation Library", University of Massachusets -- Dartmouth, Retrieved on January 16, 2009 from http://www.net-seal.net/animations.php
[14]
Texas A&M University, "Cyber-security Remote Education Access Toolkits (CREAT)", Retrieved on January 20, 2009 from http://rtds.cs.tamu.edu/security/creat/CREAT.ppt
[15]
Goodall, J., Ozok, A., Lutters, W., Komlodi, A. "A User-Centered Approach to Visualizing Network Traffic for Intrusion Detection", Conference on Human Factors in Computing Systems, April 2--7, 2005.
[16]
Ma, Kwan-Liu, "Cyber Security Through Visualization", Asia Pacific Symposium on Information Visualization, Tokyo, Japan, 2006.
[17]
Lakkaraju, K., Bearavolu, R., Slagell, A., Yurcik, W., "Closing-the-Loop: Discovery and Search in Security Visualizations", 2005.
[18]
Zabala, Enrique, RIJNDAEL CIPHER, Universidad ORT, Montevideo, Uruguay, Retrieved on January 16, 2009 from http://www.cs.bc.edu/~straubin/cs381-05/blockciphers/rijndael_ingles2004.swf
[19]
M. Guimaraes, M. Murray. "Using animation courseware in the teaching of database security", Proceedings of the 8th ACM SIGITE conference on Information technology education, October 2007, Pages 253--258.

Cited By

View all
  • (2012)First use: Introducing information security in high school oracle academy courses2012 IEEE 13th International Conference on Information Reuse & Integration (IRI)10.1109/IRI.2012.6303071(653-658)Online publication date: Aug-2012
  • (2010)Introducing multidisciplinary thinking in Computer Engineering: A new way of teaching database systemsIEEE EDUCON 2010 Conference10.1109/EDUCON.2010.5492532(523-530)Online publication date: Apr-2010
  • (2023)Teaching Database Security in an Undergraduate Database Administration Course Serving Computer Science, Information Technology and Cybersecurity StudentsProceedings of the 54th ACM Technical Symposium on Computer Science Education V. 210.1145/3545947.3576350(1406-1406)Online publication date: 1-Mar-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ITiCSE '09: Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education
July 2009
428 pages
ISBN:9781605583815
DOI:10.1145/1562877
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 July 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DBA
  2. DBMS
  3. SQL
  4. database application security
  5. database security

Qualifiers

  • Research-article

Conference

ITiCSE '09
Sponsor:

Acceptance Rates

ITiCSE '09 Paper Acceptance Rate 66 of 205 submissions, 32%;
Overall Acceptance Rate 552 of 1,613 submissions, 34%

Upcoming Conference

ITiCSE '25
Innovation and Technology in Computer Science Education
June 27 - July 2, 2025
Nijmegen , Netherlands

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2012)First use: Introducing information security in high school oracle academy courses2012 IEEE 13th International Conference on Information Reuse & Integration (IRI)10.1109/IRI.2012.6303071(653-658)Online publication date: Aug-2012
  • (2010)Introducing multidisciplinary thinking in Computer Engineering: A new way of teaching database systemsIEEE EDUCON 2010 Conference10.1109/EDUCON.2010.5492532(523-530)Online publication date: Apr-2010
  • (2023)Teaching Database Security in an Undergraduate Database Administration Course Serving Computer Science, Information Technology and Cybersecurity StudentsProceedings of the 54th ACM Technical Symposium on Computer Science Education V. 210.1145/3545947.3576350(1406-1406)Online publication date: 1-Mar-2023
  • (2020)How Secure are our Computer Systems Courses?Proceedings of the 2020 ACM Conference on International Computing Education Research10.1145/3372782.3406266(271-281)Online publication date: 10-Aug-2020
  • (2019)Database Security: An Overview and Analysis of Current TrendInternational Journal of Management, Technology, and Social Sciences10.47992/IJMTS.2581.6012.0070(53-58)Online publication date: 18-Oct-2019
  • (2019)BEST PAPER AT SIGCSE 2019 IN THE CURRICULUM INITIATIVES TRACKACM Inroads10.1145/332489710:2(58-64)Online publication date: 25-Apr-2019
  • (2019)');DROP TABLE textbooks;--Proceedings of the 50th ACM Technical Symposium on Computer Science Education10.1145/3287324.3287429(191-197)Online publication date: 22-Feb-2019
  • (undefined)Database Security: An Overview and Analysis of Current TrendSSRN Electronic Journal10.2139/ssrn.3497728
  • (undefined)Web Security: An Overview and Current TrendSSRN Electronic Journal10.2139/ssrn.3489598

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media