期刊文献+

基于客户/服务器程序的数据完整性约束 被引量:1

According to customer/server program'stipulation of the data integrality
下载PDF
导出
摘要 当今许多现代软件采用于客户程序/服务器程序(Client/Server)体系结构,数据库系统也向这种体系结构发展,它将各组成部分的工作分成一个服务进程和一个或多个客户进程。本文主要论述基于客户程序/服务器程序(Client/Server)数据完整性约束及其如何实施企业业务规则,并以SQL Server和Visual Basic为例,介绍了数据完整性约束的实现技术。 Nowadays many modem soflwares use client or server program systems, towards which data systems also go,including serving proceeding and one or several clients'proceeding. The article mainly talks about the binding of data's completeness and how to carry out enterprise's business rules.Meanwhile, it also gives some examples,such as SQL Server and Visual Basic, introducing the techniques On carrying out the binding of data's completeness.
作者 傅霞玲
出处 《武汉科技学院学报》 2008年第11期13-15,共3页 Journal of Wuhan Institute of Science and Technology
关键词 CLIENT/SERVER 数据完整性约束 企业业务规则 Client/Server binding of data's completeness enterprise's business rules
  • 相关文献

参考文献11

  • 1李昭原.数据库技术新发展[M].清华大学出版社,1997..
  • 2周龙镶.数据库管理系统实现技术.中国地质大学出版社,1990:69
  • 3[美]JeffreyD.Ullman,JenniferWidom著.史嘉权等译,数据库系统基础教程.清华大学出版社,1999.
  • 4基于Client/Server数据完整性约束的实现,载自www.solw.cn,2007.
  • 5常金良,高照艳,高晨光.在数据结构教学中采用面向对象程序方法[J].牡丹江大学学报,2008,17(9):166-167. 被引量:1
  • 6FERRAIOLODF,GILBERTDM,LYNCHN.An examination offederal and commercial access control policy needs[A].Proceedings ofthe 16^th National Computer Security Conference [C]. Baltimore, MaryLand:NISTNCS C, 1993:107116.
  • 7SANDHURS,COYNEEJ,FEINSTEINHL, etc.Role-based accesscontrol models[J].IEEE Computer, 1996,29(2):3847.
  • 8FERRAIOLODF,SANDHURS,GAVRILAS, etc.A proposed standard for role-based access control[J].ACM Transaction on Information and System Security,2001,4(3):224274.
  • 9OSBORN S,SANDHURS,MUNAWERQ.Configuring rolebased access control to enforce mandatory and discretionary access control policies [J].ACM Transaction on Information and System Security, 2000, 3 (2):85106.
  • 10AHN G J,SANDHURS.Role-based authorization constraints speciflcation[J].ACM Transaction on Information and System Security, 2000, 3(4): 207226

二级参考文献1

共引文献8

同被引文献7

  • 1Giot R, El-Abed M, Rosenberger C. GREYC keystroke: A benchmark for keystroke dynamics biometric systems[A]. Biometrics: Theory, Applications, and Systems: BTAS "09. IEEE 3rd International Conference{C].2009.1--6.
  • 2ULUDAG U,PANKANTI S,PRABHAKAR S,et al.Biometric Cryptosystems: Issues and Challenges[A] . Pmc of IEE- Conference on Multimedia Information Retrieval[C]. IEEE Press,2004.
  • 3Malinka,K.Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometrie Authentication : Internet Monitoring and Protection[A]. ICIMP'09. Fourth International Conference [ C ]. 2009.84- 89.
  • 4SUTCU Y,QIMING L, MEMON N.Protecting Biometric Templates with Sketch:Theory and Practice[J].lEEE Transactions on Information Forensics and Security, 2007,2(3):503-512.
  • 5Hemav C R, Paulraj M P,Kaur H.Brain signatures: A modality for biometric authentication[A]. Electronic Design, 2008. ICED 2008. International Conference[C].2008.1--4.
  • 6Kacholia V, Pandit S. Biometric Authentication Using Random Distributions[A]. Proceedings of the ISth Canadian IT Security Symposium[C].Ottawa,Canada,2003.1-8.
  • 7Dong Xu,Huaikou Miao,Philbert N. Model Checking UML Activity Diagrams in FDR[A]. Computer and Information Science, 2009. ICIS 2009. Eighth IEEE/ACIS International Conference[C].2009.1035-1040.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部