References
[1]. Albalawi, U. (2018, December). Countermeasure of
statistical inference in database security. In 2018 IEEE
International Conference on Big Data (Big Data) (pp.
2044-2047). IEEE. https://doi.org/10.1109/BigData.201
8.8622241
[2]. Ali, R., Liu, R., Awan, S. A., Qayoom, A., Mahmood, S.,
ur Rehman, S., & Umer, M. (2020, February). Improvisation
the security and privacy in real time database system. In
2020 International Conference on Information Science
and Communication Technology (ICISCT) (pp. 1-6). IEEE. https://doi.org/10.1109/ICISCT49550.2020.9080027
[3]. Al-Maawali, Z. A., Noronha, H., & Kumar, P. U. (2019,
January). Big data acquisition, preprocessing and
analysis to develop and implement effective database
th system with high security standards. In 2019, 4 MEC
International Conference on Big Data and Smart City
(ICBDSC) (pp. 1-4). IEEE. https://doi.org/10.1109/ICBDSC.
2019.8645583
[4]. Almutairi, A. H., & Alruwaili, A. H. (2012). Security in
database systems, Global Journal of Computer Science
and Technology Network, Web & Security, 12(17), 9-14.
[5]. Bao, H., He, H., Liu, Z., & Liu, Z. (2019, September).
Research on network privacy information security
management method based on NoSQL database. In
2019, International Conference on Virtual Reality and
Intelligent Systems (ICVRIS) (pp. 415-419). IEEE. https://doi.
org/10.1109/ICVRIS.2019.00107
[6]. Bertino, E., & Sandhu, R. (2005). Database securityconcepts,
approaches, and challenges. IEEE Transactions
on Dependable and Secure Computing, 2(1), 2-19.
https://doi.org/10.1109/TDSC.2005.9
[7]. Cinar, O., Guncer, R. H., & Yazici, A. (2016,
December). Database security in private database
clouds. In 2016, International Conference on Information
Science and Security (ICISS) (pp. 1-5). IEEE. https://doi.org/
10.1109/ICISSEC.2016.7885847
[8]. Huijie, W. (2017, December). A security framework for
th database auditing system. In 2017, 10 International
Symposium on Computational Intelligence and Design
(ISCID) (Vol. 1, pp. 350-353). IEEE. https://doi.org/10.1109/
ISCID.2017.64
[9]. Kumar, B., & Al Hasani, M. H. S. (2016, October).
Database security—Risks and control methods. In 2016,
First IEEE International Conference on Computer
Communication and the Internet (ICCCI) (pp. 334-340).
IEEE. https://doi.org/10.1109/CCI.2016.7778937
[10]. Malik, M., & Patel, T. (2016). Database security
attacks and control methods. International Journal of
Information, 6(1/2), 175-183.
[11]. Morgado, C., Baioco, G. B., Basso, T., & Moraes, R.
(2018, July). A security model for access control in graph- oriented databases. In 2018, IEEE International
Conference on Software Quality, Reliability and Security
(QRS) (pp. 135-142). IEEE. https://doi.org/10.1109/QRS.2
018.00027
[12]. Rathore, S., & Sharma, A. (2018). Database securityattacks,
threats and challenges. International Journal of
Engineering Research & Technology (IJERT), 5(10).