Database SecurityAccess Control ModelSeparation of Control and Access PermissionsDatabase Encryption AuthenticationData Encryption and StorageDatabase AuditNetwork Communication SecurityResource LabelUnified AuditDynamic Data AnonymizationRow-Level Access ControlPassword Strength VerificationEquality Query in a Fully-encrypted Database