Abstract

The focus of this research work is to investigate the problem of developing secure database applications. Currently, proposed solutions focus on data flow across so-called trust boundaries. The challenge with the current approach is that many of our applications' threats are not from malicious users. Many threats come from poor design, misunderstanding of use cases, and a lack of planning for environmental changes. Our work focuses on modeling a distributed software process where risks to the database software can be discovered in the design and the risk mitigated.

Author: Aspen Olmsted

Published in: International Conference for Internet Technology and Secured Transactions (ICITST-2024)

  • Date of Conference: 4-6 November 2024
  • DOI: 10.20533/ICITST.2024.0004
  • ISBN: 978-1-913572-76-1
  • Conference Location: St Anne’s College, Oxford University, UK

0