期刊文献+

自律式容侵安全数据库模型 被引量:1

An intrusion tolerance model of database security based on autonomic computing
下载PDF
导出
摘要 针对当前入侵容忍的数据库系统缺乏自适应能力的问题,采用了将自律计算、入侵容忍与传统数据库安全相结合的方法,提出了一个自律式容侵安全数据库模型.通过对数据库运行状态集的实时监测,自主评价访问可信度并对可疑访问进行自适应分流,并将高危访问进行特征分析并施加安全策略,最终保障数据库的安全运行.实验数据表明,该模型对本地和网络攻击可以实现有效稳定抵御,对于国家机构的数据管理、大型企业的管理控制等安全级别要求较高的领域有着重要的意义和价值. Concerning lack of self-adaptation ability on existent intrusion tolerance database systems,this paper proposed an intrusion tolerance model of database security based on autonomic computing. By defending the attacks effectively, keeping the security of database system, and providing users with contin-uous service, the simulation results show that the model has great significance for the data management in national organization or large enterprises.
出处 《河北大学学报(自然科学版)》 CAS 北大核心 2014年第3期312-316,共5页 Journal of Hebei University(Natural Science Edition)
基金 河北大学自然科学研究计划项目(2008Q50) 河北省科技厅软科学项目(12450328)
关键词 数据库 自律计算 入侵容忍 database autonomic computing intrusion tolerance
  • 相关文献

参考文献11

  • 1FRAG A J S,POWELL D.A fault and intrusion tolerant file system[Z].Proc of the 3rd International Conference on Computer Security,Washington DC,1985.
  • 2DOBSON J E,RANDELL B.Building reliable secure systems out of unreliable insecure components[Z].Proc of IEEE Symposium On Security and Privacy,Oakland,1986.
  • 3WU T,MALKI N M,BONEH D.Building intrusion tolerant applications[Z].Proc of the 8th Conference on USENIX Security Symposium,Berkeley,1999.
  • 4MARSH M A,SCHNEIDER F B.CODEX:a robust and secure secret distribution system[J].IEEE Trans on Dependable and Secure Computing,2001,1(1):34-47.
  • 5ZHOU L,FRED B S,RENESSE R.COCA: a secure distributed on-line certification authority[J].ACM Trans on Computer Systems,2002,20(4):329-368.
  • 6RABIN T.A simplified approach to threshold and proactive RSA[Z].Proc of the 18th Annual International Cryptology Conference on Advances in Cryptology,London,1998.
  • 7JARECKI S,LYSYANSKAYA A.Adaptively secure threshold cryptography:introducing concurrency,removing erasures[Z].Proc of Advances in Cryptology-EUROCRYPT,Berlin,2000.
  • 8CANETTI R,GENNARO R,JARECKI S.Adaptive security for threshold crypto systems[Z].Proc of the 19th Annual International Cryptology Conference on Advances in Cryptology,London,1999.
  • 9CUKIER M,COURTNEY T,LYONS J.Providing intrusion tolerance with ITUA[Z].Proc of International Conference on Dependable Systems and Net works (DSN),Washington DC,2002.
  • 10王慧强,吕宏武,赵倩,董玺坤,冯光升.一种关键任务系统自律可信性模型与量化分析[J].软件学报,2010,21(2):344-358. 被引量:9

二级参考文献6

共引文献8

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部