期刊文献+

数据库安全性控制的研究 被引量:9

RESEARCH OF DATABASE SECURITY CONTROL
下载PDF
导出
摘要 针对目前数据库面临的安全威胁,从数据库安全的内涵出发,分析影响数据库安全的因素,提出数据库系统的安全体系三个层次框架。重点论述这三个层次的数据库安全控制采取的技术手段和措施,并在此基础上设计了一种安全数据库体系结构,实现数据库多层安全控制技术协作与管理,更可靠地保证数据库的安全。最后展望数据库安全研究的方向。 In view of the current database security threat, starting from connotation of the database security, in this article it analyzed the elements which affect the database security, proposed three-level security system framework of database system, and emphasized on the technical measures adopted for database security control on three layers. Besides, based on this, a secure database system structure was designed to realize the cooperation and management of multi-level security control technology, and to ensure the database security. Finally, the research direction of the database security was forecasted.
出处 《计算机应用与软件》 CSCD 2009年第5期138-140,156,共4页 Computer Applications and Software
基金 广东省自然科学基金项目(7010116) 广东省粤港关键领域重点突破项目(2006A25007002) 广东省科技计划项目(2006B23004006)
关键词 数据库安全 存取控制 数据库加密 推理控制 Database security Access control Database encryption Reasoning control
  • 相关文献

参考文献8

  • 1Osborn S. Mandatory access control and role-based access control revisited[J]. Proc. the Second ACM Workshop on Role Based Access Control. Virginia : ACM Press, 1997 ( 6 ) :31 - 40.
  • 2Jajodia S. Database Security and Privacy [ J ]. ACM Computing Surveys, 1996,28 ( 1 ) :57 -64.
  • 3Li-Yan Yuan. The Documentation of Logic SQL [ M ]. Alberta University, Canada ,2005.
  • 4Chris Strahorn. Security in Next-Generation Databases [ C ]. University of California, 1998.
  • 5韩卫,张艳苏.MIS中数据库安全性研究[J].计算机工程,2002,28(6):116-117. 被引量:18
  • 6Jeong M A, Kim J, Won Y A. Flexible Database Security System Using Multiple Access Control Policies[ M ]. Berlin Heidelberg: Springer-Ver lag, 2002.
  • 7邵纯,黄上腾.IIS下Access数据库的安全性分析与策略[J].计算机应用与软件,2006,23(3):118-119. 被引量:9
  • 8罗琼,张立臣.多级实时数据库的安全性策略[J].计算机应用与软件,2005,22(7):7-8. 被引量:2

二级参考文献14

  • 1Sang H.Son“Supposing Timeliness and Security in Real-Time Database Systemsm”,Proceedings of the 9th Euromiero Workshop on Real Time System(EUROMICRO-RTS’97)1068~3070/97.
  • 2Chanjung Park,Seog Park,“A Multiversion Locking Protocol for Real.Time Databases with Multilevel Security,”Proceedings of the Third International Workshop on Real-time Computing Systems Application(RTCSA’96)O-8186-7626-4/96.
  • 3Sang H.Son,Craig Chaney,Norris P.Thomlinson,“Partial Security Policies to Suppoty Timeliness in Secure Real-Time Databases,”Dept.of Computer Science,University of Virginia,Charlottesville,VA 22903.
  • 4Chanjung Park,Seog Park,Sang H.Son,“Multiversion Locking Protocol with Freezing for Secure Real-Time Database System,”IEEE Transaction on Knowledge and Data Engineering,V01.14,No.5,9/10 2002.
  • 5Sang H.Son,Ravi Mukkamala,Rasikan David,“Integrating Security and Real-Time Requirements Using Covert Channel Capacity,”IEEE Transaction on Knowledge and Data ngineering,Vol.12,No.6,11/12 2000.
  • 6T.F.Keefe,W.T.Tsal,“Multiversion Concurrency Control for Multilevel Secure Database Systems,”CH2884-5/90/0000/0369,Computer Science Dept.Univ.of Minneapolis MN 55455.
  • 7Butler W.Lampson,“A Note on the Confinement Problem”,Communications of the ACM,Vol 16,No.10,PP.613~615,10,1973.
  • 8王波,章必雄.IIS安全机制及应用[J].交通与计算机,1999,17(6):11-14. 被引量:2
  • 9朱虹,冯玉才,吴恒山.DBMS的安全管理[J].计算机工程与应用,2000,36(1):99-100. 被引量:7
  • 10刘波.管理信息系统中数据库安全实现方法[J].计算机应用,2000,20(10):77-78. 被引量:24

共引文献26

同被引文献59

引证文献9

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部