首页 > 数据库技术 > 详细

Database Security: Database Inference

时间:2019-06-16 17:26:49      阅读:52      评论:0      收藏:0      [点我收藏+]

标签:resp   with   develop   ica   rsquo   log   add   solution   roc   

A subtle vulnerability found within database technologies is inference 推理, or the ability to derive 获取 unknown information based on retrieved information.

 

Developing technological solutions to detecting database inference is complex.

Much of the work done in this area involves revoking access to specific database objects based on a user’s past querying history (Staddon, 2003).

The problem with inference detection, especially when done at query processing time, is that it results in a significant delay between the time the query is executed and the results are presented.

As with other approaches to mitigating database security vulnerabilities, trade-offs must be made.

The protection of highly sensitive data requires an examination of what situations could lead to exposure to unauthorized users and what monitoring policies should be implemented to insure appropriate responses are enacted.

 

Database Security: Database Inference

标签:resp   with   develop   ica   rsquo   log   add   solution   roc   

原文:https://www.cnblogs.com/hbuwyg/p/11032033.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 bubuko.com 版权所有 鲁ICP备09046678号-4
打开技术之扣,分享程序人生!
             

鲁公网安备 37021202000002号