期刊文献+

安全数据库概述与前瞻 被引量:6

Secure DB and Its Developing Trends
下载PDF
导出
摘要 安全数据库的基本概念包括可信计算基、主客体分离、身份鉴别、数据完整性、自主访问控制、审计、标记与强制访问控制、数据安全模型形式化和访问监控器等。对于访问控制策略、数据库安全模型、数据库入侵检测和数据库入侵限制及恢复技术是今后研究的重要方向。
出处 《计算机系统应用》 2005年第5期91-93,共3页 Computer Systems & Applications
  • 相关文献

参考文献6

  • 1Liu P. Architectures for Intrusion Tolerant Database Systems [ C]. In: Proc. of 18th Annual Computer Security Applications Conf. Las Vegas, Nevada,Dec. 2002.
  • 2Ammann P, Jajodia S, McCollum C D, Blaustern B T. Surviving information warfare attacks on databases [ C]. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1997.164-174.
  • 3Yip R, Levitt K. Data Level Inference Detection in Database Systems[ C]. In: Proc. of the 11th IEEE Computer Security Foundations Workshop, Rockport,Massachusetts, June 1998. 179 -189.
  • 4Castano S, Fugini M G, Martella G, Samarati P,Database Security [ M]. Addison - Wesley, 1995.
  • 5钟勇,秦小麟.数据库入侵检测研究综述[J].计算机科学,2004,31(10):15-18. 被引量:18
  • 6张剡,夏辉,柏文阳.数据库安全模型的研究[J].计算机科学,2004,31(10):101-103. 被引量:12

二级参考文献31

  • 1Stolfo S,Fan D,Lee W. Credit card fraud detection using metalearning: Issues and initial results. In:Proc. AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, 1997
  • 2Axelsson S. Intrusion Detection Systems: A Survey and Taxonomy, Chalmers University of Technology, Dept. of Computer Engineering, Go'' teborg, Sweden: [Technical Report 99-15]. 2000
  • 3Allen J,et al. State of the Practice of Intrusion Detection Technologies: [Technical Report CMU/SEI-99-TR-028 ]. ESC-99-028, Carnegie Mellon University, Software Engineering Institute, Jan. 2000
  • 4Sielken R S. Application intrusion detection: [Technical Report CS-99-17]. Department of Computer Science, University of Virginia, June 1999
  • 5Qian X,et al. Detection and elimination of inference channels in multilevel relational database systems. In: Proc. of the 1993IEEE Symposium on Research in Security and Privacy, 1993.196-205
  • 6Dawson S, et al. Maximizing Sharing of Protected Information.Journal of Computer and System Science, 2002, 64(3): 496-541
  • 7Hinke T H,Delugach H,Wolf R. A framework for inference-directed data mining. In: Proc. Tenth IFIP Working Conf.Database Security, Como, Italy, July 1996
  • 8Thuraisingham, Bhavani M. Security Checking in Relational Database Management Systems Augmented with Inference Engines. Computers and Security, 1987,6: 479 - 492
  • 9Yip R,Levitt K. Data Level Inference Detection in Database Systems. In: Proc. of the 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, June 1998. 179-189
  • 10McDermott J,Goldschlag D. Storage jamming. In: D. Spooner,S. Demurjian,J. Dobson, eds. Database Security Ⅸ: Status and Prospects,Chapman & Hall, London, 1996. 365- 381

共引文献28

同被引文献25

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部