The second article that i read is called "Secure Database Management Systems" written by John Feikis. In this article, the author informs us on database security and describes the common database security problems. As organizations increase their reliance on information systems, they are becoming more vulnerable to security breaches.Especially, database security involves many issues due to the fact that it entails legal and ethical issues regarding the right to access private information. The author describes the Bell-LaPadula (BLP) model as an example of secure database management systems. He emphasizes that the BLP model is a formal description of allowable paths to information flow in a secure DBMS. He briefly explains that a secure database management system should be user-friendly, perform operations quickly and maintain data secrecy during all transactions.
The third article that i read is "Comparison of Database Management Systems" written by Gerald Post. In this article, the author explains his study on different database management systems. The quality of database engine and overall query performance are the most important features that are desired by the users. The author emphasizes that developers and database administrators perceive significant differences in the database tools they are currently using. The table below illustrates the results of author's research. According to this study, Oracle and IBM DB2 are rated higher than other competing products from a feature standpoint.
Comparison of DBMS products:(Projected column is based on regression
coefficients from group features.)
Legend for Chart:
A - DBMS
B - Rating
C - DBMS
D - Projected
A B C D
IBM DB2 7.778 Progress 7.782
DBase 7.444 Ingres 7.265
Ingres 7.308 IBM DB2 7.188
Informix 6.778 Omni 7.156
Paradox 6.556 DBase 7.115
Omni 6.400 Paradox 6.709
Oracle 6.250 Informix 6.537
Fox Pro 6.222 Fox Pro 6.371
Other 6.077 Other 6.302
Progress 6.000 Oracle 6.247
SyBase 5.857 MS SQL Server 5.532
MS SQL Server 5.684 SyBase 5.460
Access 5.000 Access 5.217
The idea of databases being subject to security breaches is an idea that never occurred to me, but an issue that is obviously very real. This is an issue that will probably become more and more important as the software is able to store more and more important information. It will be interesting to see how security systems for these databases are developed as these databases become more sophisticated and as the field of engineering starts to depend on them more and more.
ReplyDelete