Skip to main content

Ensuring Database Security with the Universal Basis of Relations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 11127)


The subject matter of the article is methods and means of the databases (DBs) security ensuring, built on the basis of the database scheme that is invariant to subject domains (SDs). The goal is to develop a substantiated approach that implements the complex use of various mechanisms ensuring the databases security built on the database schema with the universal basis of relations. The task: based on the analysis of existing database protection mechanisms supported by various database management systems (DBMSs), and features of the destination, construction of the database schema with the universal basis of relations, to develop and present in a systematized form the means and methods ensuring the databases security built on this DB schema. The following results were obtained: solving the problem of protecting databases as the most important corporate resource, in the process of creating database schema invariant to subject domains, special means were developed (in the form of implemented schema objects such as triggers, procedures, packages, tables, functions) and rules of their use, ensuring: access control to schema objects; data protection and hiding of objects; data integrity support; recovery of incorrectly modified or lost data; monitoring of the state, changes introduced into the database; logging user actions.


  • Database with the universal basis of relations
  • Database security
  • Data protection
  • Access control
  • Security policy

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-99954-8_42
  • Chapter length: 13 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
USD   79.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-99954-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   99.99
Price excludes VAT (USA)
Fig. 1.


  1. Esin, V.I.: Invariantnaya k predmetnym oblastyam shema bazy dannyh i ee otlichitelnye osobennosti. Radiotehnika: nauch.-tehn. zhurnal. 193, 133–142 (2018). (in Russian)

    Google Scholar 

  2. Esin, V.I.: Model dannyh s universalnoj fiksirovannoj strukturoj. In: Materiali mizhnarodnoyi naukovoyi konferenciyi, TAAPSD 2014, pp. 112–116. FO-P Aleksandrova M.V., Kirovograd (2014). (in Russian)

    Google Scholar 

  3. Esin, V.I., Pergamencev, Y.A.: Tehnologiya proektirovaniya modeli predpriyatiya na osnove universalnoj modeli dannyh. Accessed 26 Mar 2018. (in Russian)

  4. Connolly, T.M., Begg, C.E.: Database Systems: A Practical Approach to Design, Implementation, and Management, 6th edn. Pearson Education Limited, Harlow (2015)

    MATH  Google Scholar 

  5. Groff, D.R., Vajnberg, P.N., Oppel, E.D.: SQL: polnoe rukovodstvo, 3-e izd., Per. s angl., OOO Izdatelskij dom “Vilyams”, Moskva (2015). (in Russian)

    Google Scholar 

  6. Date, C.J.: An Introduction to Database Systems, 8th edn. Addison-Wesley, Pearson (2004)

    MATH  Google Scholar 

  7. Kajt, T.: Oracle dlya professionalov: Per. s angl. OOO «DiaSoftYuP» , Sankt-Peterburg (2003). (in Russian)

    Google Scholar 

  8. Nanda, A., Fejershtejn, S.: Oracle PL/SQL dlya administratorov baz dannyh. Per. s angl. Simvol-Plyus, Sankt-Peterburg (2008). (in Russian)

    Google Scholar 

  9. Grachev, V.M., Esin, V.I., Polukhina, N.G., Rassomakhin, S.G.: Data security mechanisms implemented in the database with universal model. Bull. Lebedev. Phys. Inst. 41(5), 123–126 (2014).

    CrossRef  Google Scholar 

  10. Esin, V.I., Esina, M.V.: Osobennosti zashity dannyh v bazah dannyh s universalnoj modelyu. Prikladnaya radioelektronika 10(2), 226–232 (2011). (in Russian)

    Google Scholar 

  11. Soroka, L.S., Esin, V.I., Esina, M.V.: Tradicionnye metody i sredstva zashity dannyh, realizovannye v baze dannyh s universalnoj modelyu dannyh. Visnik Akademiyi mitnoyi sluzhbi Ukrayini. Ser.: Tehnichni nauki 2(44), 7–12 (2010). (in Russian)

    Google Scholar 

  12. Esin, V.I., Yurasov, V.G.: Zashita dannyh v baze dannyh s universalnoj strukturoj. Informaciya i bezopasnost. Voronezh, Voronezhskij gosudarstvennyj tehnicheskij universitet. 17(2), 180–187 (2014). (in Russian)

    Google Scholar 

  13. Fedorov, A.V., Pyankov, V.M., Vihlyancev, P.S., Simonov, M.V.: Sistema razgranicheniya dostupa k dannym na urovne zapisej i yacheek. Zashita informacii INSIDE 3, 2–4 (2012). (in Russian)

    Google Scholar 

  14. Patent 8,131,664 B2, United States, Row-level security in a relational database management system/ Curt Cotner, Gilroy, CA (US); Roger Lee Miller, San Jose, CA (US); International Business Machines Corporation, Armonk, NY (US). N 12/242,241 (2012)

    Google Scholar 

  15. Homonenko, A.D., Cygankov, V.M., Malcev, M.G.: Bazy dannyh. KORONA print, Sankt-Peterburg (2004). (in Russian)

    Google Scholar 

  16. Methods and systems for transparent data encryption and decryption, United States Patent 7426745. Accessed 26 Mar 2018

  17. Esin, V.I., Esina, M.V.: Yazyk dlya universalnoj modeli dannyh. Sistemi obrobki informaciyi. 5(95), 193–197 (2011). (in Russian)

    Google Scholar 

  18. Esin, V.I., Esina, M.V.: Interpretator yazyka dlya universalnoj modeli dannyh. Nauka i tehnika Povitryanih Sil Zbrojnih Sil Ukrayini 2(6), 140–143 (2011). (in Russian)

    Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Mikolaj Karpinski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Yesin, V.I., Yesina, M.V., Rassomakhin, S.G., Karpinski, M. (2018). Ensuring Database Security with the Universal Basis of Relations. In: Saeed, K., Homenda, W. (eds) Computer Information Systems and Industrial Management. CISIM 2018. Lecture Notes in Computer Science(), vol 11127. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99953-1

  • Online ISBN: 978-3-319-99954-8

  • eBook Packages: Computer ScienceComputer Science (R0)