We believe that this kind of analysis (and the
methodology proposed) is of utmost importance for database
administrators and could be of great interest for vendors to
improve the security characteristics of future software
products and packages. As future work, we plan to further
analyze and study our method, in order to better understand
its advantages and disadvantages, possibly finding ways to
make it more simple and straightforward.