期刊文献+

基于多级入侵容忍的数据库安全解决方案 被引量:13

Solution of security database based on multi-layer intrusion tolerance
下载PDF
导出
摘要 传统的数据库安全解决方案的缺点是不能很好地解决以合法身份进行的恶意攻击,对具有不同安全需求的用户,只能提供固定的安全级别,造成资源浪费。它采用多级安全模型,即“用户+ OS + DBMS +事务级入侵容忍”,将冗余和多样性技术相结合,采用整体安全策略及面向服务的入侵容忍技术,实现数据库的可生存性、可用性及关键数据的机密性、完整性,能有效抵御以合法身份进行的恶意攻击,降低安全成本。 The traditional solution of database security has a drawback, that is , they can not deal with malicious attacks with legal identity. And they are in general not cost-effective to user who has different security requirements. It adopts multi-layer security model, namely 'user+OS +DBMS +transaction-layer intrusion tolerance', integrates redundancy and variety architectures, makes use of integral security strategy and server-oriented intrusion tolerance architecture, realizes the survive and availability of database and the integrity and confidentiality of sensitive data, can effectively resist malicious attacks with legal identity and reduces the cost of security.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第3期694-696,共3页 Computer Engineering and Design
关键词 入侵容忍 数据库安全 恶意攻击 安全级别 多级安全模型 事务 面向服务 用户 技术 合法 database security intrusion tolerance intrusion detect
  • 相关文献

参考文献5

  • 1Ammann P, Jajodia S,McCollum C D,et al. Surviving information warfare attacks on database [A]. Proceedings of the IEEE symposium on security and privacy[C].New York:IEEE, 1997.164-174.
  • 2Liu P, Jajodia S. Muliti-phase damage connement in database systems for intrusion tolerance[A].Proc 14th IEEE computer security foundations workshop[C].New York:IEEE,2001.191-205.
  • 3陈驰,孟丽荣,夏思淝.入侵容忍数据库系统中选举方案的设计与实现[J].微电子学与计算机,2002,19(11):41-43. 被引量:9
  • 4Liu P.Architecturesforintrusiontolerant database systems[C].San Diego California,2002.
  • 5朱建明,马建峰.基于容忍入侵的数据库安全体系结构[J].西安电子科技大学学报,2003,30(1):85-89. 被引量:19

二级参考文献3

  • 1[1]Feiyi Wang, Fengmin Gong, Chandramouli Sargor. Workshop on Information Assurance and Security United States Military Academy. West Point, NY, June, 2001, 5~6.
  • 2[2]SANS. SecurityGlossary, http: //www.sans.org/newlook/resources/glossary.htm, 1999.
  • 3[3]Dorothy E Denning. An Intrusion-detection model. IEEE Transactions on Software Engineering, 1987, 13(2): 222~232.

共引文献23

同被引文献52

引证文献13

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部