期刊文献+

一种高安全和易共享的数据库加密方案 被引量:5

Database Encryption Scheme for Enhanced Security and Easy Sharing
下载PDF
导出
摘要 提出一种新的数据库加密方案,该方案借鉴PGP加密算法的设计思想,在保证数据库中数据私密性的同时又为数据库提供了方便的数据共享。它综合了传统加密算法的快速高效和公钥加密算法进行密钥分发便捷的优点,为关键敏感数据提供了安全的存储环境,为密钥提供了高效的管理。该方案已在面向航天系统的国产数据库管理系统Oscarv5.1中取得成功应用。 Inspired by the PGP technique, a novel database encryption scheme was proposed for enhanced data sharing inside a database, while preserving data privacy. It was characterized by both the fast speed of the conventional encryption and the convenience of key distribution of public key encryption. It also provided secured storage for sensitive data and effective key management. The scheme had been implemented and successfully applied on Oscar v5.1, a DBMS developed for aerospace application.
作者 朱静波
出处 《计算机应用研究》 CSCD 北大核心 2007年第3期128-131,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2004AA4Z3010)
关键词 数据库加密 私密性 共享 安全目录 公钥环 database encryption confidentiality sharing security catalog public key ring
  • 相关文献

参考文献19

  • 1Database encryption in Oracle 9i^TM : a Oracle technical white paper [n]. [S.l. ] :[s. n. ] ,2001.
  • 2Encrypting data in Oracle lOg [ EB/OL ]. [ 2005-11-20 ]. http://www. oracle. tom / technology / events / oow2005 / presentations/PS_$258 _274258_106 -1 _FIN_v2. pdf.
  • 3SQL server 2005 security-part 3 encryption [ EB/OL]. [ 2005-11-20 ]http://www. databasejournal. com/ features / mssql / article. php /3483931.
  • 4DAVIDA G I,WELLS D L,KAM J B. A database encryption system with subkeys[ J]. ACM Trans. on Database System, 1981,6( 2 ):312-328.
  • 5HWANG Miashiang, YANG Weipang. A two-phase encryption scheme for enhancing database security[ J]. Journal of Systems and Software, 1995,31 ( 12 ) :257-265.
  • 6HWANG Minshiang,YANG Weipang. Multilevel secure database encryption with subkeys [ J ]. Data and Knowledge Engineering,1997,22(2) :117-131.
  • 7DIFFIE W, HELLMAN M E. New directions in cryptography [ J ].IEEE Trans. lnformat. Theory,1976 ,IT-22 :644-654.
  • 8RIVEST L A R, SHAMIR A. A method for obtaining digit signatures and public-key cryptosystems [J].Communications of the ACM.1978,21(2):120-126.
  • 9RIVEST L A R, SHAMIR A. On digit signatures and public key cryptosystems[ R ]. [ S. 1. ]: MIT Laboratory for Computer Science,1979.
  • 10BOUGANIM L, PUCHERAL P. Chip-secured data access: confidential data on untrusted servers: proc. of the 28th Intematianal Conference on Very Large Data Bases (VLDB) [ C]. Hong Kang: [ s. n. ],2002 : 131-142.

同被引文献47

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部