Implementasi Database Auditing dengan Memanfaatkan Sinkronisasi DBMS
on
Authors:
Gede Anantaswarya Abhisena, I Made Sukarsa, Dwi Putra Githa
Abstract:
“Database auditing can be an important component in database security and governance regulations. Database Administrator needs to be more alert in the methods used to maintain the corporate data, and standards and requirements available against available data. At high level, databases auditing are facility to search the usage of database authority and resources. When auditing is active, every database operation that audited generates an audit trails of the information changes made. Database synchronization is a form of replication, which is a process to convincing every copy of database comprise the same data. Database synchronization allows to utilized many purposes, one of which builds auditing that records every activities occur at database. The audit trails from the resulting of data operations allows DBAs (Database Administrators) maintained audit trails time to time, to perform an analysis of access patterns and modifications to data in DBMS (Database Management System).”
Keywords
Keyword Not Available
Downloads:
Download data is not yet available.
References
- [1] W. Wisswani, “Penerapan Hybrid Slowly Change Dimension Untuk Nearly Realtime Data Warehouse,” Lontar Komputer: Jurnal Ilmiah Teknologi Informasi, vol. 4, no. 1, 2013.
- [2] S. A, M. Sukarsa, and W. B, “Pembentukan Data Mart Menggunakan Metode Generalization,” Lontar Komputer: Jurnal Ilmiah Teknologi Informasi, vol. 7, no. 3, 2016.
- [3] N. Waraporn, “Database Auditing Design on Historical Data,” Proc. Second Int. Symp. Netw. Netw. Secur., 2010.
- [4] W. Lu and G. Miklau, “Auditing a Database Under Retention Restrictions,” IEEE Int. Conf. Data Eng., 2009.
- [5] C. Mullins, “Database Auditing Capabilities for Compliance and Security,” The Data Administration Newsletter, 2008. [Online]. Available: http://tdan.com/database-auditing-capabilities-for-compliance-and-security/8135.
- [6] R. Gudakesa, M. Sukarsa, and A. Sasmita, “Two-Ways Database Synchronization In Homogeneous DBMS Using Audit Log Approach,” J. Theor. Appl. Inf. Technol., vol. 65, no. 3, 2014.
- [7] L. Yang, “Teaching Database Security and Auditing,” Proc. 40th ACM Tech. Sympo-sium Comput. Sci. Educ., 2009.
- [8] M. C. Muray, “Database Security: What Students Need to Know,” Journal Inf. Technol. Educ. Innov. Pract., 2010.
- [9] H. Surya, “Rancang Bangun Aplikasi Sinkronisasi Database Dua Arah Pada DBMS Homogen Dengan Pendekatan Binary Log,” Universitas Udayana, 2014.
- [10] M. C. Mazilu, “Database Replication,” Database Sist. J., vol. 1, no. 2, 2010.
PDF:
https://jurnal.harianregional.com/lontar/full-31104
Published
2017-08-06
How To Cite
ABHISENA, Gede Anantaswarya; SUKARSA, I Made; GITHA, Dwi Putra. Implementasi Database Auditing dengan Memanfaatkan Sinkronisasi DBMS.Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, [S.l.], p. 89-100, aug. 2017. ISSN 2541-5832. Available at: https://jurnal.harianregional.com/lontar/id-31104. Date accessed: 28 Aug. 2025. doi:https://doi.org/10.24843/LKJITI.2017.v08.i02.p03.
Citation Format
ABNT, APA, BibTeX, CBE, EndNote - EndNote format (Macintosh & Windows), MLA, ProCite - RIS format (Macintosh & Windows), RefWorks, Reference Manager - RIS format (Windows only), Turabian
Issue
Vol. 8, No. 2 Agustus 2017
Section
Articles
Copyright
This work is licensed under a Creative Commons Attribution 4.0 International License
Discussion and feedback