期刊文献+

数据库加密系统分析研究

Analysis and Research About the Database Encryption System
原文传递
导出
摘要 数据库是信息存放的仓库,其安全性是信息安全的核心,也是信息安全的最后一道防线。本文主要在三个不同层次对数据库数据的加密进行探讨,并列举了数据加密的几种算法,同时阐述了数据库加密的局限性。 The database is the warehouse that the information deposits,its safety is the core and also the end line of the information safety.This paper mainly carried on a study on Database Encrypting to three different layers,enumerated several algorithm of Data Encryption,and elaborated the limitation of Database Encryption.
作者 任丽鸿
出处 《网络安全技术与应用》 2006年第11期66-67,共2页 Network Security Technology & Application
关键词 数据库加密 密钥 安全性 Data Encryption Cryptographic Key Security
  • 相关文献

参考文献3

二级参考文献17

  • 1Schneier B 吴世忠等(译).应用密码学-协议、算法与C源程序[M].北京:机械工业出版社,2000,1..
  • 2D Eastlake, J Reagle, D Solo. XML-Signature Syntax and Processing W3C Recommendation, 2001. http://www.w3.org/TR/xmldsig-core/
  • 3D Eastlake, J Reagle. XML Encryption Syntax and Processing W3C Candidate Recommendation, 2002. http://www.w3.org/TR/xmlenc-core/
  • 4P Hallam-Baker.XML Key Management Specification (XKMS2.0) W3C Working Draft, 2002. http://www.w3.org/TR/xkms2/
  • 5Verisign. XML Key Management Specification. 2000. http://www.xmltrustcenter.org/xkms/docs/verisign〖KG-*8〗xkms〖KG-*8〗wp.pdf
  • 6P Hallam-Baker. XML Key Management Services. 2001. http://www.w3.org/2001/07/xkms-ws/positions/VeriSign.htm
  • 7F A P Petitcolas, R J Anderson, M G Kuhn. Information hiding-A survey. Proceedings of the IEEE, 1999, 87(7): 1062~1078
  • 8I J Cox, J Kilian, F T Leighton et al. Secure spread spectrum watermarking for multimedia. IEEE Trans on Image Processing, 1997, 6(12): 1673~1687
  • 9C T Hsu, J L Wu. Hidden digital watermarks in images. IEEE Trans on Image Processing, 1999, 8(1): 58~68
  • 10E Koch, J Zhao. Towards robust and hidden image copyright labeling. The 1995 Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, 1995

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部