Return to Article Details A Review on Database Security and Authorization Download Download PDF