Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv...Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.展开更多
How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat...How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer.展开更多
This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing...This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing subsystem in the server, used to analyzed monitoring data of underground mine, judged whether it is in an abnormal state, also including the crews time recorded by RFID, so that timely alarm data is written to the database for the use of management infonlaation system; management information system adopts the three layer system structure based on B/S, the client the use of ax technology for an asynchronous request to the server, the server operation backstagc Oracle database to complete the business logic processing, and the results in XML form and return it to the client, the subsystem to the user to provide an interactive platform, users can monitor the underground state in real time, at the same time when the abnormal status, the system can timely alarm, prevent the occurrence of coal mine accidents.展开更多
In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of compute...In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of computer technology and puts forward a new concept, the abbreviation for OA, refers to the enterprise through the use of advanced science and technology, the allocation of the information resources in a reasonable manner, so as to improve the work efficiency and quality of staff, auxiliary management to make decisions, to obtain more economic benefits and main including images, text, audio, data and other information collection, and processing and storage. Among them, the office automation is based on the staff as the main body, with advanced scientific technology by combining with computer technology and form comprehensive office mode. Our proposed method serves as the novel paradigm for the development of the office automation which is meaningful.展开更多
文摘Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
文摘How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer.
文摘This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing subsystem in the server, used to analyzed monitoring data of underground mine, judged whether it is in an abnormal state, also including the crews time recorded by RFID, so that timely alarm data is written to the database for the use of management infonlaation system; management information system adopts the three layer system structure based on B/S, the client the use of ax technology for an asynchronous request to the server, the server operation backstagc Oracle database to complete the business logic processing, and the results in XML form and return it to the client, the subsystem to the user to provide an interactive platform, users can monitor the underground state in real time, at the same time when the abnormal status, the system can timely alarm, prevent the occurrence of coal mine accidents.
文摘In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of computer technology and puts forward a new concept, the abbreviation for OA, refers to the enterprise through the use of advanced science and technology, the allocation of the information resources in a reasonable manner, so as to improve the work efficiency and quality of staff, auxiliary management to make decisions, to obtain more economic benefits and main including images, text, audio, data and other information collection, and processing and storage. Among them, the office automation is based on the staff as the main body, with advanced scientific technology by combining with computer technology and form comprehensive office mode. Our proposed method serves as the novel paradigm for the development of the office automation which is meaningful.