Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 2

Database Security (1)

1. Laurie: a. Hak istimewa. b. Yang diperlukan untuk keamanan BD. 2. Meg Coffin Murray: a. Access Control. b. DB Vulnerability. c. DB Inference. 3. Emil Burtescu: a. Attack Specific to the DB. b. Control Methods.

Database Security (2)


3. Elmasri: a. Constraints. b. Integrity. 4. Ramakrishnan: a. DB Security. b. Access Control.

You might also like