Implementation of RDBMS MySQL security monitor in DBF/DAM systems
Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 99-101.

Voir la notice de l'article provenant de la source Math-Net.Ru

In this article, an information is given about the development of a prototype system implementing the mandatory access control and hiding database structure features for RDBMS MySQL on the basis of a formal DP-model, database firewall and database activity monitoring solutions. Proposed prototype is implemented in Lua as a module for MySQL-proxy utility. Each transition rule of the DP-model corresponds to implemented function in the code, and special functions are added to establish interaction between elements of the MySQL-proxy system and implemented rules of the formal model.
Keywords: computer security, access control implementation, DBF/DAM systems, RDBMS MySQL, MySQL-proxy.
@article{PDMA_2014_7_a42,
     author = {N. O. Tkachenko},
     title = {Implementation of {RDBMS} {MySQL} security monitor in {DBF/DAM} systems},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {99--101},
     publisher = {mathdoc},
     number = {7},
     year = {2014},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2014_7_a42/}
}
TY  - JOUR
AU  - N. O. Tkachenko
TI  - Implementation of RDBMS MySQL security monitor in DBF/DAM systems
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2014
SP  - 99
EP  - 101
IS  - 7
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2014_7_a42/
LA  - ru
ID  - PDMA_2014_7_a42
ER  - 
%0 Journal Article
%A N. O. Tkachenko
%T Implementation of RDBMS MySQL security monitor in DBF/DAM systems
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2014
%P 99-101
%N 7
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2014_7_a42/
%G ru
%F PDMA_2014_7_a42
N. O. Tkachenko. Implementation of RDBMS MySQL security monitor in DBF/DAM systems. Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 99-101. http://geodesic.mathdoc.fr/item/PDMA_2014_7_a42/

[1] Database Activity Monitoring/Database Firewall, http://www.provision.ro/threat-management/database-security/database-activity-monitoring-database-firewall#pagei-1|pagep-1|

[2] Kolegov D. N., Tkachenko N. O., Chernov D. V., “Razrabotka i realizatsiya mandatnykh mekhanizmov upravleniya dostupom v SUBD MySQL”, Prikladnaya diskretnaya matematika. Prilozhenie, 2013, no. 6, 62–67

[3] Hinz S., DuBois P., Stephens J., MySQL 5.7 Reference Manual, http://dev.mysql.com/doc/refman/5.7/en/mysql-proxy.html

[4] Ierusalimschy R., Henrique de Figueiredo L., Celes W., The Programming Language Lua. Lua 5.2 Reference Manual, http://lua.org/manual/5.2/