{"title":"Modelling Database Security through Agent-Based Simulation","authors":"R. Chiong, Sandeep Dhakal","doi":"10.1109/AMS.2008.164","DOIUrl":null,"url":null,"abstract":"This paper presents an implementation on modelling the database security using agent-based simulation (ABS). While ABS has been widely used for social simulations since the 1990s, not many previous studies have tried simulating scenarios in more technical domains and it is the main objective of this work to fill in the gap. We develop a database security simulation program that includes permission rules and immediate fixing of corrupted data. We show that when privileges are selectively granted based on certain rules and regulations, database security can be dramatically improved. We also demonstrate that if corrupted data are fixed immediately, the database will not collapse. In the concluding remarks, we present our observation on the advantages of ABS.","PeriodicalId":122964,"journal":{"name":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Second Asia International Conference on Modelling & Simulation (AMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AMS.2008.164","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
This paper presents an implementation on modelling the database security using agent-based simulation (ABS). While ABS has been widely used for social simulations since the 1990s, not many previous studies have tried simulating scenarios in more technical domains and it is the main objective of this work to fill in the gap. We develop a database security simulation program that includes permission rules and immediate fixing of corrupted data. We show that when privileges are selectively granted based on certain rules and regulations, database security can be dramatically improved. We also demonstrate that if corrupted data are fixed immediately, the database will not collapse. In the concluding remarks, we present our observation on the advantages of ABS.