Database Security Model in the Academic Information System

Database plays an important role on both web-based or desktop based academic information system (AIS) in Indonesian higher education institutions (HEI). Nowadays webbased AIS dominates in Indonesian HEI, almost every HEI uses web-based AIS with relational database management system (RDBMS) as database software. Relational database systems such as Oracle, MySQL, MS SQL Server or PostgreSQL are familiarly used as database management system in the AIS. There are many researches on development of AIS in HEI but none of them is discussing database security and integrity. This research will perform the analysis of database security model that could be used in AIS such as table constraints, table relationships and role-based access control (RBAC).

[1]  Ramadian Agus Triyono,et al.  Pembangunan Sistem Informasi Kartu Rencana Studi (Krs) Dan Kartu Hasil Studi (KHS) On Line Pada Sekolah Tinggi Ilmu Tarbiyah Nahdlatul Ulama (STIT NU) Pacitan , 2012 .

[2]  Yuri Yudhaswana Joefrie,et al.  DESAIN BASIS DATA SISTEM INFORMASI AKADEMIK DI FAKULTAS TEKNIK UNIVERSITAS TADULAKO , 2013 .

[3]  Stéphane Coulondre,et al.  A relational database integrity framework for access control policies , 2010, Journal of Intelligent Information Systems.

[4]  Hadi M.Kom Ahmaddul,et al.  Rancang Bangun Sistem Pengamanan Dokumen Pada Sistem Informasi Akademik Menggunakan Digital Signature dengan Algoritma Kurva Eliptik , 2012 .

[5]  Dan Liu,et al.  Study on methods for data confidentiality and data integrity in relational database , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[6]  Silvana Castano,et al.  Database Security , 1997, IFIP Advances in Information and Communication Technology.

[7]  R. Rizal Isnanto,et al.  ANALISIS KEAMANAN SISTEM INFORMASI AKADEMIK FAKULTAS TEKNIK UNDIP VERSI0.4 TAHUN 2005 , 2011 .

[8]  John J. Marciniak,et al.  Encyclopedia of Software Engineering , 1994, Encyclopedia of Software Engineering.

[9]  Fedi Rahadi Noviandi PENNGEMBANGAN SISTEM INFORMASI AKADEMIK FAKULTAS TEKNIK UNIVERSITAS TANJUNGPURA , 2013 .

[10]  Min-Shiang Hwang,et al.  Privacy Protection Data Access Control , 2013, Int. J. Netw. Secur..

[11]  Yuval Elovici,et al.  Database encryption: an overview of contemporary challenges and design considerations , 2010, SGMD.

[12]  Nhan Le Thanh,et al.  Enforcing Access Control to Web Databases , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[13]  Ibrahim Kamel,et al.  Toward protecting the integrity of relational databases , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).

[14]  Ayman Mohamed Mostafa,et al.  Interactive multi-layer policies for securing relational databases , 2012, International Conference on Information Society (i-Society 2012).

[15]  Syed Afaq Husain,et al.  A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations , 2013, TheScientificWorldJournal.