Publication: Damian - herramienta de seguridad DAM para bases de datos Oracle en entornos empresariales: monitoreo de actividad y control de acceso
Authors
Authors
Abstract (Spanish)
Director
Advisors/Directors
Extent
Al consultar y hacer uso de este recurso, el usuario acepta las condiciones de uso establecidas por los autores. Este documento está protegido por derechos de autor. Su reproducción o distribución total o parcial está permitida únicamente con fines académicos y con la debida citación del autor.
Collections
References
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). "Role-Based Access Control Models." IEEE Computer, 29(2), 38-47.
Saltzer, J. H., & Schroeder, M. D. (1975). "The Protection of Information in Computer Systems." Proceedings of the IEEE, 63(9), 1278-1308.
Ponemon Institute. (2022). "Cost of Insider Threats: Global Report." Ponemon Institute
Samarati, P., & de Vimercati, S. C. (2001). "Access Control: Policies, Models, and Mechanisms." Foundations of Security Analysis and Design, 137-196.
Fernández, E. B., & Mujica, P. (2011). "Two Patterns for Identity Management." Journal of Research and Practice in Information Technology, 43(1), 43-60.
Halfond, W. G., Viegas, J., & Orso, A. (2006). "A Classification of SQL Injection Attacks and Countermeasures." Proceedings of the IEEE International Symposium on Secure Software Engineering.
Shackleford, D. (2015). "The State of Threat Intelligence: A SANS Survey." SANS Institute
Patterns, A. (2009). DAM, 67 Data Mining, 61 Database Activity Monitoring, 67 DBMS, 54 DBSCAN, 265. Machine Learning in Cyber Trust: Security, Privacy, and Reliability, 177(178), 359
European Union. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). Official Journal of the European Union, L119, 1–88
U.S. Department of Health & Human Services. (2003). HIPAA Administrative Simplification: Regulation Text.
Mogull, R. (2013). Understanding and selecting a database activity monitoring solution. Arhive. org, May, 1, 24.
Grushka-Cohen, H., Biller, O., Sofer, O., Rokach, L., & Shapira, B. (2020, May). Using bandits for effective database activity monitoring. In Pacific-Asia Conference on Knowledge Discovery and Data Mining (pp. 701-713). Cham: Springer International Publishing.
Grushka-Cohen, H., Biller, O., Sofer, O., Rokach, L., & Shapira, B. (2019). Diversificación del seguimiento de la actividad de la base de datos con bandits. Preimpresión arXiv arXiv:1910.10777.
Halfond, W. G., & Orso, A. (2005, May). Combining static analysis and runtime monitoring to counter SQL-injection attacks. In Proceedings of the third international workshop on Dynamic analysis (pp. 1-7).
Kim, S., Cho, N. W., Lee, Y. J., Kang, S. H., Kim, T., Hwang, H., & Mun, D. (2013). Aplicación de la detección de valores atípicos basada en la densidad a la supervisión de la actividad de la base de datos. Fronteras de los Sistemas de Información, 15, 55-65.
IDERA. (s. f.). SQL Compliance Manager - Online Store. IDERA.
Recuperado el 20 de agosto de 2025, de https://store.idera.com/buynow/onlinestore?ptid=%7BBF4C68B3-2BAF-45E4- B32D-B728CC201E43%7D
TrustRadius. (s. f.). IDERA SQL Secure Pricing. TrustRadius.
Recuperado el 20 de agosto de 2025, de https://www.trustradius.com/products/idera-sql-secure/pricing
IBM. (s. f.). IBM Guardium Data Encryption Pricing. IBM.
Recuperado el 20 de agosto de 2025, de https://www.ibm.com/products/guardiumdata-encryption/pricing
Amazon Web Services (AWS). (s. f.). IBM Guardium on AWS Marketplace. AWS Marketplace.
Recuperado el 20 de agosto de 2025, de https://aws.amazon.com/marketplace/pp/prodview-ukvsu4lwl7j6c
Insight. (s. f.). Imperva Data Secure Base Plan Enhanced - Annual Subscription. Insight.
Recuperado el 20 de agosto de 2025, de https://www.insight.com/en_US/shop/product/ADATST1V11S1YRHYB1/imperva %20inc/A-DATS-T1-V1-1S-1Y-R-HYB/
Microsoft Azure Marketplace. (s. f.). Imperva Data Security. Azure Marketplace.
Recuperado el 20 de agosto de 2025, de https://azuremarketplace.microsoft.com/enus/marketplace/apps/imperva1586960588823.data_security