期刊文献+

基于SQL的陕西“东大门”人才管理软件研究与设计

Research and Design of Shaanxi "East-gate" Talent Management Software Based on SQL
下载PDF
导出
摘要 陕西"东大门"建设关键在于人才,而对人才的管理则须相应的管理软件作为手段之一.文章简单介绍人才管理软件系统概况,采用图示形式阐明系统框架结构,对后台数据库的选择及其特点做了分析;以数据库系统安全访问控制模型为突破口进行数据库系统安全性设计,并通过数据备份机制保障数据库在遭受意外攻击时进行自我恢复;使用C#作为开发平台,仿真实验表明数据库安全性得到了加强,软件具备较好的使用性能,使用该系统能够高效管理人才信息. The key to Shaanxi "east gate" construction lies in the talented person and the related management software is one of the methods to the talent management. The paper simply introduces talent management software system, clarifies the frame struc- ture of the system based on the graphic form, and analyzes the choice and the characteristics of the backstage database. Based on the design of the database system security for the breakthrough of the database system security access control model, and through the da- ta backup mechanism security database in accident attack self-recovery, using c # as a development platform, the paper shows that the database security are enhanced by simulation experiments and the software has the good performance, which proves the system can effectively manage the personnel information.
作者 阴国富
出处 《渭南师范学院学报》 2012年第12期73-76,共4页 Journal of Weinan Normal University
基金 陕西省社科界2012年重大理论与现实问题研究项目(2012Z027) 渭南市科技计划项目(2012KYJ-4)
关键词 软件 数据库 东大门 人才管理 software database east-gate talent management
  • 相关文献

参考文献7

二级参考文献43

  • 1陈楠,薛质.SQL注入攻击的实现和防范[J].信息安全与通信保密,2005(1):48-50. 被引量:18
  • 2史创明.边缘网关协议BGP及漏洞攻击防范[J].微计算机信息,2005,21(07X):60-62. 被引量:6
  • 3Sandhu R,Jajodia S. Data and Database Security and Controls.Handbook of Information Security Management, Auerbach Publishers, 1993. 481~ 499
  • 4Ferraiolo D F,Cugini J, Kuhn D R. Role Based Access Control:Features and Motivations. In: Computer Security Applications Conf. 1995
  • 5Sandhu R. Relational Database Access Controls. Handbook of Informantion Secutrity Management(1992-95 Yearbook),Auerbach Publishers, 1994. 145 ~ 160
  • 6Sandhu R. Mandatory Controls For Database Integrity. In:Proc.of the IFIP WG11. 3 Workshop on Database Security,Monterey,Colifornia ,Sep. 1989
  • 7American National Standard for Information Technolology. Role Based Access Control. Information Technology Industry Council (ITI),Draft, Apr. 2003
  • 8Ferraiolo D F,et al. Proposed NIST Standard for Role-Based Access Control. ACM Transaction on Information and System Security,2001,4(3): 224~274
  • 9Graubart,Richard. On the Need for a Third Form of Access Control. In: Proc. of the 12th National Computing Security Conf.1989. 296~303
  • 10Sandhu R,Chen F. The Multilevel Relational (MLR) Data Model. ACM Transactions on Information and System Security, 1998,1(1):93~132

共引文献107

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部