期刊文献+

数据库安全研究现状与展望 被引量:18

Present Status and Trends of Researches on Database Security
原文传递
导出
摘要 数据库系统是当今大多数信息系统中数据存储和处理的核心。针对数据库系统的攻击将直接导致敏感与隐私信息泄露。开展数据库安全理论与技术研究,是实现数据库系统安全的迫切需求。文章通过总结与分析数据库安全的研究现状与发展趋势,认为我国在该领域与国际上的差距在不断缩小;当前既是数据库技术领域变革期,也是我国数据库安全领域研究的重要机遇期,并在此基础上提出了对策与建议。 Database system is the core part of data storage and processing in the current information systems.Attacks towards the database systems will directly result in the leakage of sensitive or private data.Research on the theory and techniques of database security is a basic requirement of database protection.By surveying on the present status and developments of the database security,we conclude that the gap between overseas and China is narrowing now,and the changing and developing of the database technology is providing a great opportunity for the database security researcher in China.Several suggestions and propositions are promoted to improve the researches in China.
作者 张敏
出处 《中国科学院院刊》 2011年第3期303-309,共7页 Bulletin of Chinese Academy of Sciences
关键词 数据库安全 安全数据库管理系统 数据库-即-服务 海量信息处理 database security secure database management system database-as-a-service massive information processing
  • 相关文献

参考文献20

  • 1Lunt T F, Denning D E, Schell R R et al. The SeaView Security Model. IEEE Transactions of Software Engineering, 1990, 16(6): 593-607.
  • 2Stachour P D, Thuraisingham B. Design of LDV: A Multilevel Secure Relational Database Management System. IEEE Transactions on Knowledge and Data Engineering, 1990, 2(2): 190-209.
  • 3Jajodia S, Sandhu R S. Towards a Multilevel Secure Relational Model. SIGMOD, 1991, 20(2): 50-59.
  • 4McHugh J. Covert channel analysis: A chapter of the handbook for the computer security certification of trusted system. NRL Technical Memorandum. 1995, 5 540: 062A.
  • 5Jajodia S, Atluri V, Keefe T F et al. Multilevel Security Transaction Processing. Journal of Computer Security, 2001, 9(3): 165-195.
  • 6Agrawal R, Kieman J, Srikant R et al. Hippocratic databases. In: proc. VLDB, 2002.
  • 7National Computer Secuirty Center. Trusted Database Management System Interpretation of the TCSEC(TDI), NCSC-TG-021, 1991.
  • 8Rizvi S, Mendelzon A O, Sudarshan S et al. Extending Query Rewriting Techniques for Fine-grained Access Control. SIGMOD Conference, 2004, 551-562.
  • 9Liu P. Architectures for Intrusion Tolerant Database Systems. Proc. 18th Ann. Computer Security Applications Conf. (ACSAC 2002), 2002.
  • 10http://aws.amazon.com/simpledb/.

同被引文献75

引证文献18

二级引证文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部