Providing security in a phone book database using triggers.
Sharon R. LewisSimon R. WisemanNeil D. PoulterPublished in: ACSAC (1992)
Keyphrases
- database
- database security
- databases
- database applications
- statistical databases
- microsoft access
- sensitive data
- cutting edge
- detailed discussion
- active databases
- book presents
- access control
- network security
- book covers
- microsoft sql server
- relational databases
- information security
- intrusion detection
- data model
- database software
- information systems
- topics covered include
- biometric template