期刊文献+

基于入侵容忍的集成数据库安全结构

Integrated database security architecture based on intrusion-tolerance
下载PDF
导出
摘要 提出了一种综合的数据库安全结构,该结构利用密码学知识,设计了加密认证模块,实现了数据的完整性、机密性,并保证了源数据的合法性。该结构还具有单一错误检测修正功能,单一错误的纠正,可以容忍在数据传输过程中的错误,实现了数据库的外部级入侵容忍。内部容忍模块给出了一种基于入侵容忍的内部数据库结构,提高数据库的柔性和抵御入侵的能力。该系统不仅具有入侵容忍功能,而且还具有加密认证功能,适用于安全需求较高的领域。 An integrated database security architecture is proposed. The encryption/authentication component, making use of cryptographic knowledge, not only makes the database integrity and confidentiality, but also have the function of detecting and correcting the single error. The single error correction tolerate the transfer's intrusion, and this enables the outer-level intrusion-tolerance. Inner intrusion-tolerant component provides an intrusion-tolerance based database security structure. The flexibility and the ability of protecting from attacks are improved. This system has the functions of not only intrusion-tolerance, but also encryption and authe-ntication. So it can apply to fields where the higher security level is needed.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第22期4291-4293,4373,共4页 Computer Engineering and Design
关键词 入侵容忍 加密 认证 数据库安全 错误纠正 intrusion tolerance encryption authentication database security error correction
  • 相关文献

参考文献6

  • 1Paulo Esteves Ver'ssimo,Nuno Ferreira Neves,Miguel Pupo Correia.Intrusion-tolerant architectures:Concepts and design[C].LNCS 2677,Springer Verlag,2003.
  • 2Zhang C N,Honglan Zhong.An integrated approach for database security and fault tolerance[J].Proceedings of International Conference on Information Technology,2004,1 (1):762-766.
  • 3Peng Liu.Engineering a distributed intrusion tolerant database system using COTS components[J].Proceedings of the DARPA Information Survivability Conference and Exposition,2003,2(2):284-289.
  • 4荆继武,周天阳.Internet上的入侵容忍服务技术[N].中国科学院研究生学报,2001.12-18-2.
  • 5Yang L,Hano L.Redundant residue number system based error correction codes[J].IEEE Electronics Letters,2001,37 (4):247-248.
  • 6Spafford E H,Zamboni D.Intrusion detection using autonomous agents[J].Computer Networks,2000,34(4):547-570.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部