期刊文献+

一种基于访问标记的安全数据库审计方法

A Security Database Auditing Method Based on Access Attributes
下载PDF
导出
摘要 目前国内各类计算机信息系统在行业应用中普遍使用国外厂商开发的数据管理系统,但这类系统普遍存在用户操作不透明、审计效率低等问题。为了实现高效安全的细粒度实时审计功能,提出了一种基于访问标记的安全数据库审计方法,针对普通数据和高安全级别数据分别采用基于角色权限和基于访问凭证的标记方法,实现了高效安全的细粒度权限实时审计功能。该审计方案已应用于国网数据库管理软件SG-RDB中,系统测试和实际应用结果表明,该方案能够提供高性能的实时审计服务,可满足行业应用要求。 At present, DBMS developed by foreign manufacturer are mostly used in our country. Because of the opacity of user operation and the overhead of system, we propose a new auditing method based on access attribute in security database in this paper. On the basis of traditional auditing methods, our method uses the attribute of role privileges for common data and uses the attribute of access credentials for secure data, achieving the balance of authentication control and system performance and providing fine-grained permission auditing. It works perfectly in SG-RSB system without the system overhead. The security analysis and practical application show that this method has high availability and security.
出处 《电力信息与通信技术》 2017年第12期41-46,共6页 Electric Power Information and Communication Technology
关键词 数据库审计 访问标记 安全数据库 实时审计 database auditing access attribute security database real-time audit
  • 相关文献

参考文献5

二级参考文献32

  • 1沈辉,张龙.基于WinPcap的网络数据监测及分析[J].计算机科学,2012,39(S2):15-18. 被引量:18
  • 2黄芳,孙建伶.一种新的数据库系统的归约审计模型[J].计算机工程与应用,2004,40(20):175-176. 被引量:3
  • 3[1]刘启源, 刘怡编著. 数据库与信息系统的安全. 北京: 科学出版社, 2000
  • 4[2]A Guide to Understanding Audit in Trusted System.NCSC-TG-001,ver 2,National Computer Security Center,1988
  • 5[3]Bell, Padula L. Secure Computer Systems: Mathematical Foundation and Model M74~244.Bedfrod, Mass: The MITRE Corporation, 1975
  • 6S Castano,M G Fugini,et al.Database Security[M].Addison Wesley,1994.
  • 7Ahmad Baraani-Dastjerdi,Josef Pieprzyk,Reihaned Safavi-Naini.Security in Databases: A Survey Study[R].Department of Computer Science,University of Wollongong,1996.
  • 8Chris Strahorn.Security in Next-Generation Databases[C].University of California,1998.
  • 9Sushil Jajodia.Database Security and Privacy[J].ACM Computing Surveys,1996,28(1).
  • 10Dorothye E Denning,Peter J Denning.Data Security[J].Computing Surveys,1979,II(3).

共引文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部