期刊文献+

地震前兆数据库系统共享接口设计与实现 被引量:6

The Design and Implementation of Data Exchange Interface in Earthquake Precursor Database
下载PDF
导出
摘要 为解决分析预报等相关专业软件访问前兆数据库时存在的性能与安全问题,本文设计了地震前兆数据库系统共享接口软件。该软件可以隔离数据库与应用程序,对应用程序的数据使用情况进行审计与控制,切断非法、低效的数据访问请求;同时,使用连接池、数据缓存和数据压缩等技术提高前兆数据的访问速度。软件无需安装Oracle客户端,易于使用,屏蔽了数据库表结构的复杂性。 Earthquake precursor data exchange interface is developed in order to solve problems caused by direct connection to earthquake precursor database, which can isolate database and application software, and has ability to monitor and control data usage and block illegal and low efficient data request. The interface software combines connection pool, data cache and data compression technology that can gain very high data transfer speed. The interface software is also easy to deploy without the need to install Oracle client, and easy to use without the knowledge to table structure of precursor database.
作者 王军 李正媛 黄经国 刘春国 周克昌 Wang Jun;Li Zhengyuan;Huang Jingguo;Liu Chunguo;Zhou Kechang(China Earthquake Networks Center,Beijing 100045,China)
出处 《震灾防御技术》 CSCD 北大核心 2018年第3期709-717,共9页 Technology for Earthquake Disaster Prevention
基金 国家自然科学基金项目(41372349)
关键词 地震前兆数据库 ORACLE 数据交换接口 Precursor database Oracle Data exchange interface
  • 相关文献

参考文献3

二级参考文献15

  • 1Mykletun E, Narasimha M, Tsudik G. Authentication and in- tegrity in outsourced databases. ACM Trans. on Storage, 2006, 2 (2) : 107-138.
  • 2Shmueli E, Waisenberg R, Elovici Y, Gudes E. Designing se- cure indexes for encrypted databases. In: Proc. of the IFIP Conf. on Database and Applications Security. LNCS 3654, Heidelberg, Berlin: Springer-Verlag, 2005: 54-68.
  • 3ESTRIND,TSUDIK G .Visa scheme for inter2 organization net work security [ C ] //Proc of the 1987 Symposium on Secu- rity and Privacy. New York: IEEE, 1987:174 - 183.
  • 4Emekci F, Agrawal D, Abbadi AE, Gulbeden A. Privacy pre- serving query processing using third parties. In: Barga RS, Zhou XF, eds. Proc. of the Int'l Conf. on Data Engineering. Washington: IEEE Computer Society Press, 2006, 27.
  • 5Shmueli E,Waisenberg R, Elovici Y, et al. Designing secure in- dexes for encrypted databases[C]// Proc of the IFIP Conf on Database and Applications Security, LNCS 3654. Heiddberg, Berlin: Springer-Verlag, 2005 : 54- 68.
  • 6Estrind, Tsudik G. Visa scheme for inter-organization net work security[C]//Proc of the 1987 Symposium on Securi- ty and Privacy. New York: IEEE, 1987: 174--183.
  • 7Emekci F, Agrawal D, Abbadi A E, et al. Privacy preser ring query processing using third parties[C]//Barga R S, Zhou X F. Proc of the Int Conf on Data Engineering. Wash- ington: IEEE Computer Society Press, 2006: 27.
  • 8Oracle Corporation. Architecture of Oracle Net Services [Z]. Oraclegi Net Services Administrator's Guide Release 2 (9.2) :Part Number A96580-02.
  • 9Wong R. Oracle Net8 Administrator' s Guide Release 8. 0 [Z]. December, 1997 : A58230-01.
  • 10Mykletun E, NarasimhaM, TsudikG. Authentication and integrity'in outsourceddatabases[J]. ACMTrans on Stor- age,2006,2(2):107--138.

共引文献60

同被引文献71

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部