期刊文献+

基于安全审计与访问控制的Oracle SE系统的设计 被引量:1

Oracle SE System Based on Security Audit and Access Control
下载PDF
导出
摘要 为了提高Oracle数据库安全性,提出了OracleSE的方案,研究OracleSE的设计思路和基本原理,从多个角度描述了OracleSE的体系结构,最后给出OracleSE对外提供的安全功能的设计方法。最后对OracleSE原型系统进行了验证工作,以明确在Oracle数据库上加载OracleSE系统后,对原有应用造成的影响。 In order to improve the safety of the Oracle database, the paper proposes a scheme of OracleSE, research es- OracleSE design train of thought and basic principle, describes the architecture of OracleSE from multiple angles, finally pro- vides design method on security features based on OracleSE. Finally OracleSE prototype system are verified to make clear the effects on the original application after OrcleSE system is loaded in Oracle data base.
作者 李明
出处 《计算机与数字工程》 2014年第4期664-667,724,共5页 Computer & Digital Engineering
关键词 数据库 安全体系 OracleSE体系结构 强制访问控制 安全审计 database, security system, OracleSE architecture, mandatory access control, security audit
  • 相关文献

参考文献5

二级参考文献43

  • 1张剡,夏辉,柏文阳.数据库安全模型的研究[J].计算机科学,2004,31(10):101-103. 被引量:12
  • 2钟勇,秦小麟.数据库入侵检测研究综述[J].计算机科学,2004,31(10):15-18. 被引量:18
  • 3[1]anderson J P.Computer Security Threat Monitoring and Surveillance Fort Washington,James P.Anderson Co.,1980
  • 4[2]Matt B,Christopher W,Jeremy F.Goal-oriented Auditing and Logging IEEE Transactions on Computing Systems,1996
  • 5[3]Price K E.Hostbased Misuse Detection and Conventional Operating Systems audit Data Collection[Masters Thesis].Purdue University 1997-12
  • 6[4]Giovanni V,Inspect:A Lightweight Distributed Approach to Autom-ated Audit Trail Analysis.http://citeseer.nj.nec.com/276699.html
  • 7[5]Daniels T E,Spafford E H.A Network Audit System for Hostbasted Intrusion Detecti(NASHID)in Linux.Purdue University,2000
  • 8Castano S, Fugini M G, Martella G, Samarati P,Database Security [ M]. Addison - Wesley, 1995.
  • 9Liu P. Architectures for Intrusion Tolerant Database Systems [ C]. In: Proc. of 18th Annual Computer Security Applications Conf. Las Vegas, Nevada,Dec. 2002.
  • 10Ammann P, Jajodia S, McCollum C D, Blaustern B T. Surviving information warfare attacks on databases [ C]. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1997.164-174.

共引文献75

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部