References
- S.M. Groomer and U.S. Murthy, "Continuous auditing of database applications: An embedded audit module approach," In Continuous Auditing: Theory and Application, 2018, pp.105-124.
- Separation of system resources guideline, UC Berkely Information Security Office, https://security.berkeley.edu/separation-system-resources-guideline
- M. Malik and T. Patel, "Database security attacks and control methods," International Journal of Information, Vol.6, 2016, pp.175-183.
- P. Colombo and E. Ferrari, "Enforcement of purpose based access control within relational database management systems," IEEE Transactions on Knowledge and Data Engineering, Vol.26, No.11, 2014, pp.2703-2716. https://doi.org/10.1109/TKDE.2014.2312112
- SU. Moon and YJ. Jeong, "System and method for authentication," DC: U.S. Patent and Trademark Office, 2016.
- M. Guarnieri, S. Marinovic, and D. Basin, D. "Strong and provably secure database access control," In 2016 IEEE Euro S&P, 2016, pp.163-178.
- CK. Wee and R. Nayak, R. "A novel database exploitation detection and privilege control system using data mining," In Modern Approaches for Intelligent Information and Database Systems, 2018, pp.505-516.
- N. Batra and H. Aggarwal, "Autonomous multilevel policy based security configuration in distributed database," International Journal of Computer Science Issues(IJCSI), Vol.9, No.6, 2012, pp.170-176.
- YS. Jang and JY. Choi, "Detecting SQL injection attacks using query result size," Comput. Sec., Vol. 44, 2014, pp.104-118. https://doi.org/10.1016/j.cose.2014.04.007
- JS. Park and CS. Kim, "Research trends analysis of big data: focused on the topic modeling," The korea society of digital industry and information management, Vol.15, No.1, 2019, pp.1-7.
- ES. Cho, SY. Min, SH. Kim, and BG. Kim, "Development of extracting system for meaning subject related social topic using deep learning," The korea society of digital industry and information management, Vol.14, No.4, 2019, pp.35-45.