Abstract
The system management complexity is exponentially increasing for the computing systems by even threatening their viability. Researchers and practitioners are scrambling to significantly simplify the all aspects of system management complexity. One of the most notable efforts towards this direction is the autonomic computing initiative, which is inspired by how the human body works to manage itself. In this paper, we focus on the database security management. We approach the security management issues from the autonomic computing perspective. We consider situations where the database is damaged by successful malicious attacks. Our goal is to design the system in such a way that the database system should be able to isolate the damaged parts of the system and to keep the other parts of the system functioning as the damage is being repaired.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
IBM Tivoli Risk Manager. Info. available at: http://www-306.ibm.com/software/tivoli/products/risk-mgr/
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proc. of VLDB (2002)
Agrawal, S., Chaudri, S., Narasayya, V.R.: Automated Selection of Materialized Views and Indexes for SQL Databases. In: Proc. of VLDB (2000)
Axelsson, S.: Intrusion Detection Systems: A Taxomomy and Survey. Technical report, Dept. of Computer Engineering, Chalmers University of Technology, Sweden (2000)
Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. Addison-Wesley Publishing Company, Reading (1995)
Chaudhuri, S., Christensen, E., Graefe, G., Narasayya, V.R., Zwilling, M.J.: Self-tuning technology in microsoft SQL server. Data Engineering Bulletin 22(2), 20–26 (1999)
Damiani, E., di Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted Relational DBMSs. In: Proc. of 10th ACM Conf. On Computer and Communications Security (2003)
Denning, D.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering 13(2) (1987)
Ganek, A.G., Corbi, T.A.: The Dawning of the Autonomic Computing Era. IBM Systems Journal 42(1), 5–18 (2003)
Hacıgümüş, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in Database Service Provider Model. In: Proc. of ACM SIGMOD (2002)
Hacıgümüş, H., Iyer, B., Mehrotra, S.: Providing Database as a Service. In: Proc. of ICDE (2002)
Jensen, C.S., Mark, L., Roussopoulos, N.: Incremental Implementation Model for Relational Databases with Transaction Time. IEEE Transactions on Knowledge and Data Engineering 3(4), 461–473 (1991)
Kemmerer, R.A., Vigna, G.: Intrusion detection: a brief history and overview. IEEE Computer 35(4) (2002)
Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. IEEE Computer 36(1), 41–50 (2003)
Kwan, E., Lightstone, S., Storm, A., Wu, L.: Automatic Configuration for IBM DB2 Universal Database, available at: http://www.redbooks.ibm.com/redpapers/pdfs/redp0441.pdf
Lohman, G., Lightstone, S.: SMART: Making DB2 (More) Autonomic. In: Bressan, S., Chaudhri, A.B., Li Lee, M., Yu, J.X., Lacroix, Z. (eds.) CAiSE 2002 and VLDB 2002. LNCS, vol. 2590. Springer, Heidelberg (2003)
Lohman, G., Valentin, G., Zilio, D., Zuliani, M., Skelly, A.: DB2 Advisor: An optimizer Smart Enough to Recommend Its Own Indexes. In: Proc. of ICDE (2000)
Lunt, T., Fernandez, E.B.: Database Security. ACM SIGMOD Record 19(4) (1990)
Rao, J., Zhang, C., Lohman, G., Megiddo, G.: Automating Physical Database Design in a Parallel Database System. In: Proc. of ACM SIGMOD (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hacıgümüş, H. (2006). SPIDER: An Autonomic Computing Approach to Database Security Management. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2006. Lecture Notes in Computer Science, vol 4165. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11844662_13
Download citation
DOI: https://doi.org/10.1007/11844662_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38984-2
Online ISBN: 978-3-540-38987-3
eBook Packages: Computer ScienceComputer Science (R0)