期刊文献+

一种数据库加密系统的设计与实现 被引量:6

The Design and Implementation of a Database Encryption System
下载PDF
导出
摘要 随着数据库储存容量的不断增大,越来越多信息和重要数据都被储存在数据库系统中,不法用户的窃取以及黑客的攻击为数据储存带来严重的安全隐患。为了降低信息泄露风险维护系统信息安全,本文以某数据库管理系统为研究对象,在该系统中运用加密技术,将重要的数据信息进行加密处理,以降低信息泄露的可能性,并简单的介绍了库内加密技术和库外加密技术以及加密系统的模块组成。 with the development of database storage capacity increasing, more and more information and important data are stored in the database system, illegal users and hackers steal data storage brings serious safe hidden danger. In order to reduce the risk of information security safeguard system of information disclosure, this paper takes a database management system as the research object, in the system using the encryption technology, the important data information encryption processing, in order to reduce the possibility of information disclosure, and simply introduced the Cune^a sealin~ technoloffy and library encrvotion technology and encryotion system modules.
作者 刘芳
出处 《软件》 2012年第11期97-98,共2页 Software
基金 江西省教改课题<新建应用型本科院校数据库课程教学改革与探索>(JXJG-11-22-21)的研究成果
关键词 库外加密 数据库系统 设计与实现 Library encryption database system design and Implementation
  • 相关文献

参考文献3

二级参考文献35

  • 1王正飞 王曼 汪卫 等.数据库中加密字符数据的存储与查询[J].计算机研究与发展,2004,41(1):66-71.
  • 2Beimel A, Ishai Y. Information-Theoretic Private Information Retrieval: A Unified Construction: [ECCC Report TR01-015].Feb. 2001
  • 3Chor B, Goldreich O, Kushilevitz E, et. al. Private Information Retrieval. In:Proe. of 36th IEEE Conference on FOCS, 1995
  • 4Marks D G. Inference in MLS Database Systems [J]. IEEE Transaction on Knowledhe and Data Engineering, 1996, 8(1):46-55
  • 5Song Xiaodong D, Wanger D,Perring A. Practical Techniques for Searches on Encrypted Data. In: The IEEE Symp on Security and Privacy, Oakland, California, 2000
  • 6Bertino E,Ooi Beng Chin,Yang Yanjiang,et al. Privacy and Ownership Preserving of Outsourced Medical Data. ICDE, 2005. 521-532
  • 7Mykletun E, Narasimha M, Tsudik G. Authentication and Integrity in Outsourced Databases. In:Proceedings of NDSS 2004, San Diego, California, USA
  • 8Mykletun E,Tsudik G. Incorporating a Secure Coprocessor in the Database-as-a-Service Model. In: IWIA2005 for Future Generation High Performance Processors and Systems, Oahu, Hawaii,USA, Jan. 2005
  • 9Miklau G, Suciu D. Controlling Access to Published Data Using Cryptography. In: VLDB, 2003
  • 10Hacigumus H,Iyer B,Mehrotra S, Providing Database as a Service. In:Proc. of ICDE, 2002

共引文献20

同被引文献43

引证文献6

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部