期刊文献+

基于密码学的访问控制和加密安全数据库 被引量:11

Progress of Cryptographic Access Control and Encryption Security Database
下载PDF
导出
摘要 在数据库安全领域的研究中,“数据库管理者”对数据库安全带来的安全隐患越来越受到研究者的关注,尤其是在基于互联网的网络应用提供商(Internet service provider)模式的数据库系统中,这种安全威胁更为严重.传统的数据库访问控制(存取控制)方法,对此安全隐患不能提供有效的安全防范.密码学的安全数据库技术,因为其基于数学难解问题的计算复杂性,成为解决数据库安全问题的日渐重要的方法.本文分析了迄今为止各种不同的,针对分布式数据库应用的安全威胁,并对密码学安全数据库中的基于密码学的访问控制算法和加密数据库技术进行了综述,并对各类方法的密码学原理,算法特性以及其优缺点进行了分析和描述. Researchers on security database concern more and more the security threats from DBA(database administrator), for its resulting in increasing crime to intemet commercial databases which exist in the mode of ASP(Application service provider) recently, and its theoretic and technical hardness. Traditional access control could not provide enough ,security for the purpose, cryptographic ,security database becomes a promising scheme favored by its computing complexity of mathematical difficulties. We analyse various and up to date ,security threats to distributed database application systems, and give an overview for cryptographic access control and encryption database technology. Each class and approach is described and evaluated with its cryptographic principle, algorithm characters and positive and negative performance. We focus on the term of cryptanalysis of the schemes, which is considered the crucial points of the technology.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第11期2043-2046,共4页 Acta Electronica Sinica
基金 国家自然科学基金(No.60573132) 国家自然科学基金(No.60503063) 深圳市项目(No.200507)
关键词 密码学 安全数据库 访问控制 加密数据库 cryptographic ,security database access control encryption database
  • 相关文献

参考文献15

  • 1Lampson B W.Protection[A].Proc.of The 5th Princeton Symposium on Information Science and Systems[C].Princeton,New Jersey,USA,March,1971.437-443.
  • 2Denning P J.Protection-principles and practice[A].Proc.of the Spring Joint Computer Conference[C].Montvale,New York,1972.40.
  • 3Harrison M A,et al.Protection in operation system[J].Communications of the ACM,1976,19(8):14-24.
  • 4Denning D E.Database Security[M].Annual Review Inc,1988.
  • 5Costich O,et al.A multilevel transaction problem for multilevel secure database systems and its solution for replicated architecture[A].Proc.of IEEE Computer Society Symposium on Research in Security and Privacy[C].Oakland,CA,1992.192-203.
  • 6Denning D E,et al.A multilevel relational data model[A].Proceedings of the First International Workshop on Object-Oriented Database Systems[C].Pacific Grove,1986.
  • 7Dwyer P A,et al.Multilevel security in database management systems[J].Computers and Security,1987,6(3):252-260.
  • 8Harrington A,et al.Cryptographic access control in a distributed file system[A].Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies[C].Como,Italy,2003.158-165.
  • 9He J,et al.Cryptography and relational database management system[A] Proc.of Database,Engineering and Application Symposium[C].Grenoble,France,2001.273-284.
  • 10Mattsson U,et al.Secure Data Functional Overview[M].Protegity Technical Paper TWP-0011,2000.

同被引文献124

引证文献11

二级引证文献83

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部