期刊文献+

数据库服务器的安全性 被引量:2

The security of database server
下载PDF
导出
摘要 从数据库的复杂性、拙劣数据库安全的危害及数据库的基础等方面,阐述了数据库安全的重要性,简述了数据库安全漏洞的类型,并以SQLServer、Oracle等为例,介绍了数据库安全特征的不成熟、数据库密码管理、操作系统的后门等数据库漏洞区域,对数据库的安全做了总结,对数据库服务器安全的维护提出了新的论证,在数据库服务器安全的维护及数据库的架构方面做了有益的尝试。 The importance of database security was expatiated and the types of database security leaks were explained briefly from the aspects of database complexity, damage caused by inferior database security and the foundation of database etc. SQL Server and Oracle were taken as examples to introduce the immature aspects of database security characteristics, database password management, operating system back door and other database leak areas. The database security was summarized. New demonstrations of the database security preservation were put forward. And a beneficial trial on preserving database security and on structuring database was made.
出处 《山东建筑工程学院学报》 2004年第2期80-83,共4页 Journal of Shandong Institute of Architecture and Engineering
关键词 数据库 安全保障 漏洞 数据库密码 信息风险管理 database security safeguard leaks database password information risk management
  • 相关文献

参考文献4

  • 1Thomas C C B.数据库系统-设计、实现与管理(第2版)[M].宁洪,译.北京:电子工业出版社,2004.
  • 2O'Neil P,O'Neil F.数据库原理、编程与性能(第2版)[M].周傲英,译.北京:机械工业出版社,2002.
  • 3数据库安全:保证Oracle数据库安全性的策略和方法[DB/OL].http://www.fanqiang.com.
  • 4SQL Server 2000的安全配置[DB/OL].http://www.knowsky.com.

同被引文献44

  • 1孙玉海,孟丽荣.基于多级入侵容忍的数据库安全解决方案[J].计算机工程与设计,2005,26(3):694-696. 被引量:13
  • 2[4]Linger R C,Mead N R,Lipson H F.Requirements definition for survivable network systems.system design laboratory.SRI Internationa1 Press,2002
  • 3[5]胭喜戎,孙锐.信息安全原理及应用.北京:北京大学出版社.2003
  • 4[6]Liu P.Architectures for intrusion tolerant database systems.18th Annual Computer Security Applications Conference,San Diego California,2002
  • 5[7]Denning D E.An intrusion-detection model.IEEE Transaction on Software Engineering,1987;13(2):222-223
  • 6[8]Alessandri A A,Cachin D,Creese C,et al.Conceptual model and architecture of MAFTIA.Project MAFTIA IST-1999-11583 deliverable D21,http://www.research.ec.org/maftia/deliverables/D21.pdf.2002
  • 7[9]Malkhi A L,Pierce D,Reiter E,et al.Dynamic byzantinequorum systems.In:Proceedings of the IEEE International Conference on Dependable Systems and Networks,2000:283-292
  • 8[10]Kim A Y,Schultz Y C,et al.Exploring robustness in group key agreement.In:Proceedings of the 21th IEEE International Conference on Distributed Computing Systems,2001:399-408
  • 9[11]Steiner A G,Tsudik M.New multi-party authentication services and key agreement protocols.IEEE J of Selected Areas on Communications 18 2000:42
  • 10[12]Laprie A A,Randell J C.Fundamental concepts of dependability.Technical Report 01145,LAAS-CNRS,Toulouse,France,2001

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部