期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
基于SSL的数据库安全代理设计 被引量:2
1
作者 向春枝 李小明 《煤炭技术》 CAS 北大核心 2011年第7期135-137,共3页
该文对SSL协议进行了详细的分析,提出了一种双向的身份鉴别方式,即在网络数据库系统中,通过采用SSL协议证书的方式进行认证,通过SSL协议在服务器及数据库用户二者间建立一条保密的安全通道,把数据库与SSL紧密联系起来,并在此基础上,构... 该文对SSL协议进行了详细的分析,提出了一种双向的身份鉴别方式,即在网络数据库系统中,通过采用SSL协议证书的方式进行认证,通过SSL协议在服务器及数据库用户二者间建立一条保密的安全通道,把数据库与SSL紧密联系起来,并在此基础上,构建了一套数据库安全代理系统。基于SSL协议的数据库安全系统,能够完成数据库的数据安全传输和安全访问等功能,以确保系统的信息安全,其同时也为安全连接需求的远程应用设计模式提供了有益的借鉴。 展开更多
关键词 SSL 数据库安 服务器平台 客户端代理
下载PDF
STUDY AND IMPROVEMENT OF MLS RELATIONAL DATA MODEL
2
作者 王立松 丁秋林 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2003年第2期236-242,共7页
The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data... The conception of multilevel security (MLS) is commonly used in the study of data model for secure database. But there are some limitations in the basic MLS model, such as inference channels. The availability and data integrity of the system are seriously constrained by it′s 'No Read Up, No Write Down' property in the basic MLS model. In order to eliminate the covert channels, the polyinstantiation and the cover story are used in the new data model. The read and write rules have been redefined for improving the agility and usability of the system based on the MLS model. All the methods in the improved data model make the system more secure, agile and usable. 展开更多
关键词 data model multilevel secure database covert channels POLYINSTANTIATION cover story
下载PDF
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
3
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare Proactive security Intrusion tolerant DSPS(Database Security and Protection System)
下载PDF
Aging effects on QT interval: Implications for cardiac safety of antipsychotic drugs 被引量:1
4
作者 Simon W. Rabkin 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2014年第1期20-25,共6页
Objectives To explore the effect of aging on cardiac toxicity specifically the interaction of age and antipsychotic drugs to alter the QT interval. Methods The Medline databases were searched using the OvidSP platform... Objectives To explore the effect of aging on cardiac toxicity specifically the interaction of age and antipsychotic drugs to alter the QT interval. Methods The Medline databases were searched using the OvidSP platforms with the search strategy: "QT interval" or "QT" and "age" or "aging". The entry criteria were: over 10,000 apparently healthy individuals with data on both sexes; QT interval corrected for heart rate (QTc) and an expression of its variance for multiple age decades extending into the older ages. Results QTc increased in duration with increasing age. Considering a modest one SD increment in QTc in the normal population, the addition of Chlorpromazine produced a QTc on average greater than 450 ms for ages 70 years and older. Risperidone, that did not on average alter QTc, would be expected to produce a QTc of 450 ms in persons in their mid 70 years under some circumstances. QTc prolongation 〉 500 ms with antipsychotic drugs is more likely for persons with QTc initially at the 99th percentile. It may occur with Haloperidol which does not on average alter QTc. Conclusions The range of values for the QT interval in apparently normal older men or women, when combined with the range of expected QT interval changes induced by antipsychotic drugs, can readily be associated with prolonged QTc. Individuals with QTc at the 99th percentile may have serious QTc prolongation with antipsychotic drugs even those that are not usually associated with QTc prolongation. 展开更多
关键词 Cardiac safety Antipsychotic drugs Psychotropic drugs QT interval AGING
下载PDF
A reference model for database security proxy 被引量:1
5
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第1期30-36,共7页
How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat... How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer. 展开更多
关键词 information warfare database security FIREWALL reference model security proxy
下载PDF
Efficient hardware-based private information retrieval using partial reshuffle
6
作者 Lan Tian Qin Zhiguang 《High Technology Letters》 EI CAS 2010年第3期263-267,共5页
The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the s... The paper proposes a novel hardware-based private information retrieval (HWPIR) protocol. By partially reshuffling previously accessed items in each round, instead of frequently reshuffling the whole database, the scheme makes better use of shuffled data copies and achieves the computation overhead at O(/N/K),where N and k are the sizes of the database and secure storage respectively. For securestorage with moderate size, e.g. k = O(/N), the overhead is 0(4/N). The result is much better than the state-of-art schemes (as compared to e.g. O(log2N)). Without increasing response time and communication cost, the proposed protocol is truly practicable regardless of the database size. The security and preformance of the protocol is formally analyzed. 展开更多
关键词 private information retrieval (PIR) trusted hardware reshuffle security PRACTICALITY
下载PDF
Design and implementation of coal mine safety management system based on Ajax and RFID
7
作者 Zhentao Ni Jiantao Zhao Chang Liu 《International Journal of Technology Management》 2013年第8期122-124,共3页
This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing... This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing subsystem in the server, used to analyzed monitoring data of underground mine, judged whether it is in an abnormal state, also including the crews time recorded by RFID, so that timely alarm data is written to the database for the use of management infonlaation system; management information system adopts the three layer system structure based on B/S, the client the use of ax technology for an asynchronous request to the server, the server operation backstagc Oracle database to complete the business logic processing, and the results in XML form and return it to the client, the subsystem to the user to provide an interactive platform, users can monitor the underground state in real time, at the same time when the abnormal status, the system can timely alarm, prevent the occurrence of coal mine accidents. 展开更多
关键词 coal mine safety information management Ajax: RFID
下载PDF
Research on Network Platform of Information Management and Security
8
作者 Xiang Xin 《International Journal of Technology Management》 2013年第2期107-109,共3页
With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of netwo... With the rapid development and wide application of network technology, information security issues are increasingly highlighted, received more and more attention. This article introduces the present situation of network information security, discusses the connotation of network information security, and analyzes the main threat to the security of the network information. And we separately detailed description of the data monitoring platform architecture from the data layer, network layer and presentation layer three levels, focuses on the functional structure of intelligent database platform, and puts forward to measures that ensure the safety of the platform and the internal data security. Through the design of the platform to improve the information security system has certain significance. 展开更多
关键词 information security real-time monitoring network security
下载PDF
Research on the Office Automation System Development and Practice based on Database Optimization and Security Enhancement Technology
9
作者 HongLan Li 《International Journal of Technology Management》 2015年第11期23-25,共3页
In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of compute... In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of computer technology and puts forward a new concept, the abbreviation for OA, refers to the enterprise through the use of advanced science and technology, the allocation of the information resources in a reasonable manner, so as to improve the work efficiency and quality of staff, auxiliary management to make decisions, to obtain more economic benefits and main including images, text, audio, data and other information collection, and processing and storage. Among them, the office automation is based on the staff as the main body, with advanced scientific technology by combining with computer technology and form comprehensive office mode. Our proposed method serves as the novel paradigm for the development of the office automation which is meaningful. 展开更多
关键词 Office Automation System Database Optimization Security Enhancement.
下载PDF
Distributed secure quantum machine learning 被引量:8
10
作者 Yu-Bo Sheng Lan Zhou 《Science Bulletin》 SCIE EI CAS CSCD 2017年第14期1025-1029,共5页
Distributed secure quantum machine learning (DSQML) enables a classical client with little quantum technology to delegate a remote quantum machine learning to the quantum server with the privacy data preserved. More... Distributed secure quantum machine learning (DSQML) enables a classical client with little quantum technology to delegate a remote quantum machine learning to the quantum server with the privacy data preserved. Moreover, DSQML can be extended to a more general case that the client does not have enough data, and resorts both the remote quantum server and remote databases to perform the secure machi~ learning. Here we propose a DSQML protocol that the client can classify two-dimensional vectors to dif- ferent clusters, resorting to a remote small-scale photon quantum computation processor. The protocol is secure without leaking any relevant information to the Eve. Any eavesdropper who attempts to intercept and disturb the learning process can be noticed. In principle, this protocol can be used to classify high dimensional vectors and may provide a new viewpoint and application for future "big data". 展开更多
关键词 Quantum machine learning Quantum communication Quantum computation Big data
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部