Trigger and Database Security

Authors

  • YAYA ITAI Babcock University, Nigeria
  • AWODELE OLUDELE PhD Computer Science & Math Department Babcock University
  • NICOLAE GOGA PhD Molecular Dynamics GroupUniversity of Groningen, the Netherlands and Faculty of Engineering in Foreign LanguagesPolitehnica University of Bucharest Romania

DOI:

https://doi.org/10.24297/ijct.v4i1b.3060

Keywords:

DataBase Security, shutdown, Authorization, Trigger

Abstract

Database Security is a growing concern evidenced by an increase in the number of reported incidencesof loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. Security models, developed for databases differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This paper explains the need for a database trigger and it role in enforcing the various database security challenges.

 

 

 

Downloads

Download data is not yet available.

Author Biography

YAYA ITAI, Babcock University, Nigeria

PHD student, Computer Science & Math Department

Downloads

Published

2013-02-01

How to Cite

ITAI, Y., OLUDELE PhD, A., & GOGA PhD, N. (2013). Trigger and Database Security. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 4(1), 57–62. https://doi.org/10.24297/ijct.v4i1b.3060

Issue

Section

Research Articles