Implementation of RDBMS MySQL security monitor in DBF/DAM systems | Applied Discrete Mathematics. Supplement. 2014. № 7.

Implementation of RDBMS MySQL security monitor in DBF/DAM systems

In this article, an information is given about the development of a prototype system implementing the mandatory access control and hiding database structure features for RDBMS MySQL on the basis of a formal DP-model, database firewall and database activity monitoring solutions. Proposed prototype is implemented in Lua as a module for MySQL-proxy utility. Each transition rule of the DP-model corresponds to implemented function in the code, and special functions are added to establish interaction between elements of the MySQL-proxy system and implemented rules of the formal model.

Download file
Counter downloads: 335

Keywords

компьютерная безопасность, управление доступом, реализация моделей безопасности, DBF/DAM-системы, СУБД MySQL, MySQL-proxy, computer security, access control implementation, DBF/DAM systems, RDBMS MySQL, MySQL-proxy

Authors

NameOrganizationE-mail
Tkachenko N. O.n.o.tkachenko@gmail.com
Всего: 1

References

Database Activity Monitoring / Database Firewall. http://www.provision.ro/threat-management/database-security/database-activity-monitoring-database-firewall# pagei-1| pagep-1|
Колегов Д. Н., Ткаченко Н. О., Чернов Д. В. Разработка и реализация мандатных механизмов управления доступом в СУБД MySQL //Прикладная дискретная математика. Приложение. 2013. №6. С. 62-67.
Hinz S., DuBois P., and Stephens J. MySQL 5.7 Reference Manual. http://dev.mysql.com/ doc/refman/5.7/en/mysql-proxy.html
Ierusalimschy R., Henrique de Figueiredo L., and Celes W. The Programming Language Lua. Lua 5.2 Reference Manual. http://lua.org/manual/5.2/
 Implementation of RDBMS MySQL security monitor in DBF/DAM systems | Applied Discrete Mathematics. Supplement. 2014. № 7.

Implementation of RDBMS MySQL security monitor in DBF/DAM systems | Applied Discrete Mathematics. Supplement. 2014. № 7.