We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Implementation of Agent-Based Simulation for Database Security

by Rashmi M Jogdand, Swapna S Banasode
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 28 - Number 5
Year of Publication: 2011
Authors: Rashmi M Jogdand, Swapna S Banasode
10.5120/3384-4693

Rashmi M Jogdand, Swapna S Banasode . Implementation of Agent-Based Simulation for Database Security. International Journal of Computer Applications. 28, 5 ( August 2011), 18-23. DOI=10.5120/3384-4693

@article{ 10.5120/3384-4693,
author = { Rashmi M Jogdand, Swapna S Banasode },
title = { Implementation of Agent-Based Simulation for Database Security },
journal = { International Journal of Computer Applications },
issue_date = { August 2011 },
volume = { 28 },
number = { 5 },
month = { August },
year = { 2011 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume28/number5/3384-4693/ },
doi = { 10.5120/3384-4693 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:13:57.885019+05:30
%A Rashmi M Jogdand
%A Swapna S Banasode
%T Implementation of Agent-Based Simulation for Database Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 28
%N 5
%P 18-23
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents an implementation of secure database access using agent-based simulation. Database and Database System are an essential component of everyday life in modern society. Daily, most of users encounter several activities that involve some interaction with a Database. In multiuser Database there is no restriction on data access, which meant everybody could access anyone else’s data because of which malicious destruction or alternation of data can be done. The data stored in the Database need to be protected from unauthorized access and malicious destruction or alternation. In this paper a Agent-Based Simulation program is introduced that includes permission rules for accessing the data and it also includes finding the total number of corrupted data files obtained by applying permission rule to data access so that reliability of the database can be determined using the corrupted data files. This paper aim is to finding the reliability of the database with different types of permission rules.

References
  1. Macro Remondino.2004. Multi-Agent Based Simulation For Database Security: A framework In Proceedings of 18th Europen Simualtion Multiconference.
  2. Yi Mu and Vijay Varadharajan. Towards a Protection Model for supporting Multiple Access Control Policies.
  3. Robert W. Baldwin.1990. Naming and Grouping Privileges to simplify security management in Large Databases.
  4. Elisa Bertino and Elena Ferrari. Data Security. 22nd International Computer Software and Applications Conference, IEEE Computer Society, Vienna.
  5. Zhu Yangqing.et al. 2009. Design of A New Web Database Security Model. 2nd International Symposium on Electronic Commerce and Security.
  6. Raymond Chiong and Sandeep Dhakal. 2008. Modelling Database Security through Agent-Based Simulation. 2nd Asia International Conference on Modelling and Simulation.
  7. Stan Franklin and Art Graesser.1996. Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents. In Proceedings of the 3rd international workshop on Agent Theories, Architectures, and Languages,Springer-Verlag.
  8. Macro Vieria and Henrique Madeira. 2005. Towards a Security Benchmark for Database Management Systems. In Proceedings of the International Conference on Dependable Systems and Networks.
  9. Ramez Elmasri and Shamkant B. Navathe. Fundamentals of Database Systems.4th Edition book.
Index Terms

Computer Science
Information Sciences

Keywords

Database Agent-Based simulation security permission rules reliability of the database