期刊文献+

基于对偶编码函数的密文过滤技术在医院Oracle数据库中的应用研究 被引量:1

Application Research of Cryptograph Filtration Technology Based on the Pairs Coding Function in Oracle Database
下载PDF
导出
摘要 对数据库进行加密后,如何提高密文数据的操作性能是一个非常重要的问题,而基于对偶编码函数的密文过滤技术则可很好地解决此问题。文中在给出对偶编码函数的定义后,着重分析了四种基本查询基于对偶编码函数的转换规则,并利用JAVA语言将基于对偶编码函数的密文过滤技术在医院Oracle数据库中进行了实现,最后通过实验验证了此技术对密文数据操作性能有巨大提升。 After carrying on encryption to the database,how to improve the operation performance of the cryptograph data becomes an important problem.Cryptograph filtration technology based on the pairs coding function can settle the problem perfectly.After giving the definition of pairs coding function , conversion rule of four basic query based on the pairs coding function was analyzed expressly in this paper.Cryptograph filtration technology based on the pairs coding function was actualized in oracle database by using JAVA language,in the end great promotion of the technology to cryptograph operation performance was validated by experiment.
出处 《中国医疗设备》 2010年第1期37-41,14,共6页 China Medical Devices
关键词 对偶编码函数 密文过滤技术 ORACLE数据库 数据库加密 pairs coding function cryptograph filtration technology Oracle database database encryption
  • 相关文献

参考文献10

  • 1Rivest R L,Adlem A L,Dertouzos M L.On Data Banks and Privacy Homomorphism[M].//Foundations of Secure Computation.New York:Academic Press, 1978:169-178.
  • 2杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 3R.Agrawal,J.Kirenan,R.Srikant,et al.Order Preserving Encryption for Numeric Data[C].//SIGMOD.Proceedings of the 2004 ACM SIGMOD international conference on Management of data.New York:ACM Press,2004:563-574.
  • 4Zhengfei Wang,Jing Dai,Wei Wang,et al.Fast Query over Encrypted Character Data in Database[J].International Symposium on Computer Information Science,2004,4(4):289-300.
  • 5强士卿,程光.基于流的哈希函数比较分析研究[J].南京师范大学学报(工程技术版),2008,8(4):25-28. 被引量:7
  • 6蒋曹清.Java安全体系结构研究[J].广西科学院学报,2006,22(4):246-249. 被引量:2
  • 7Bjarki Holm,John Carnell.Oracle 9i Java程序设计[M].康博.北京:清华大学出版社,2002.
  • 8霍斯特曼,科奈尔.Java2核心技术卷Ⅰ:原理[M].李如豹,等.译.第五版.北京:机械工业出版社,2002:2-86.
  • 9FIPS 197.Advanced Encryption Standard[M].US:National Institute of Scienceand Technology,2001:1-51.
  • 10Nechvatal J,Bassham E,Bassham L,et al.Report on the Development of the Advanced Encryption Standard [J]. Res National Institute of Standards and Technology, 2000,106(3):511-577.

二级参考文献17

  • 1[1]Molina M,Niecolini S,Duffield N G.A comparative experimental study of hash functions applied to packet sampling[C]//International Teletraffic Congress(ITC-19).Beijing:2005.
  • 2[2]Molina M,Tartarelli S,Raspallm F,et al.Implementation of an IPFIX compliant flow traffic meter:challenges and performance assessment[C]// IEEE Workshop on IP Operations and Management,2003:61 -67.
  • 3[4]Whang K,Vander Zanden B,Taylor H.A Linear-time probabilistic counting algorithm for database applications[J].ACM Trans on Database Systems,1990,15(2):208 -229.
  • 4[5]Zseby T,Molina M,Raspall F,et al.Sampling and filtering techniques for IP packet selection[EB/OL].IETF 2004:32 -33.http://tools.ietf.org/html/draft-ietf-psamp-sample -tech -05#section-17.
  • 5[6]Jenkins B.Algorithm Alley,Dr.Dobb' s Journal,September 1997[J/OL].http://burtleburtle.net/bob/hash/doobs,html.
  • 6Rivest R L, Adleman L, Detrouzos M L. On Data Banks and Privacy Homomorphism[C]. Foundations of Secure Computation New York: Academic Press, 1978:169-179
  • 7Domingo-Ferrer J. A New Privacy Homomorphism and Application s[J]. Information Processing Letters, 1996, 60(5): 277-282
  • 8Domingo-Ferrer J. Multi-application Smart Cards and Encrypted Dat a Processing. Future Generation Computer Systems, 1997,13
  • 9Cormen T, Leiserson C, Rivest R. Introduction to Algorithms. Cambridge,MA: MIT Press, 1990
  • 10Stallings W. Cryptography and Network Security. Principles and Practice (Second Edition). 2001

共引文献25

同被引文献3

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部