期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
数据库安全系统开发与应用
1
作者 黄雅琼 《计算机光盘软件与应用》 2014年第20期175-176,共2页
随着科学技术的不断发展进步,不同领域的各个企业都开始使用数据库系统,并且数据库系统的使用也给企业带来了很大的收益。但是,在近几年来,部分不法分子借着自己的高科技水平,对企业的数据库系统实施了攻击,盗取或损坏企业的高级机密,... 随着科学技术的不断发展进步,不同领域的各个企业都开始使用数据库系统,并且数据库系统的使用也给企业带来了很大的收益。但是,在近几年来,部分不法分子借着自己的高科技水平,对企业的数据库系统实施了攻击,盗取或损坏企业的高级机密,给企业的生产带来了不可预估的损失。为了保障企业数据库的安全保密,我们必须开发设计数据库安全系统,并将之应用到企业的各个领域,确保企业的利益不受到危害。本文就数据库安全系统的开发以及应用做了相应的阐述。 展开更多
关键词 数据库安全系统 开发 应用
下载PDF
数据库安全技术研究 被引量:11
2
作者 刘自伟 蔡勇 陈波 《西南科技大学学报》 CAS 2002年第3期1-4,12,共5页
本文论述了数据库安全系统的概念 ,数据库的安全机制及其强化方法 ,最后给出了数据库安全的设计与实现方法。
关键词 数据库安全系统 安全机制 数据库管理系统 存取控制 数据安全 运行安全 信息安全
下载PDF
三○盛安 数据库安全审计系统
3
《计算机安全》 2004年第6期49-49,共1页
关键词 数据库安全审计系统 协议分析 数据重组 三○盛安
下载PDF
校友录及交流平台的安全与数据库权限设置 被引量:1
4
作者 李沂桥 《电子制作》 2013年第17期81-81,57,共2页
信息系统的安全是非常重要的,信息系统的安全管理分为系统级的数据库安全管理和应用级安全管理两个方面。防止校友录及交流平台系统数据库中存储的数据被不法用户利用是非常重要的。保证系统正常运行的一个基本条件是,简单、有效的安全... 信息系统的安全是非常重要的,信息系统的安全管理分为系统级的数据库安全管理和应用级安全管理两个方面。防止校友录及交流平台系统数据库中存储的数据被不法用户利用是非常重要的。保证系统正常运行的一个基本条件是,简单、有效的安全访问控制。一般当系统拥有了合理有效的页面访问控制机制就能够安全的使用。下面本文将主要从系统数据库安全管理与应用安全管理两方面来解决该系统的安全问题。通过介绍数据库权限控制的主要方法来设置数据库权限。 展开更多
关键词 系统安全 系统数据库安全 数据库权限设置 角色访问控制
下载PDF
数据库系统的安全管理 被引量:1
5
作者 胡炜 《信息与电脑(理论版)》 2012年第5期95-96,共2页
本文主要探讨数据库安全管理的访问控制模型,通过分析改造数据库实现数据库安全,并对数据库中间件(DBSAPI)进行了一些有益的探讨。数据库管理系统(Database Management System)是一种操纵和管理数据库的大型软件,主要用于建立、使用和... 本文主要探讨数据库安全管理的访问控制模型,通过分析改造数据库实现数据库安全,并对数据库中间件(DBSAPI)进行了一些有益的探讨。数据库管理系统(Database Management System)是一种操纵和管理数据库的大型软件,主要用于建立、使用和维护数据库。它对数据库进行统一的管理和控制并保证数据库的安全性和完整性。对数据库系统进行安全评估有两种方式:专家评估和系统评估工具。专家评估与系统评估工具比较,有许多优点,随时随地可以进行,专家的聪明才智和经验也可以充分发挥。数据库系统的定期安全评估则更多采用系统评估工具,如Nessus、NMAP等评估工具。由于系统不断变化的特点,当系统状态发生了变化,如一些新用户的增加,用户权限的修改,这时系统很可能出现新的安全隐患。专家对系统的安全评估是针对系统被评估时的状态,而请专家定期评估,一是成本高,二是劳动强度大。但在系统状态发生变化后,系统安全评估工具则可以重新对系统进行评估。 展开更多
关键词 数据库管理系统数据库安全模型安全数据库安全数据库中间件(DBSAPI)
原文传递
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
6
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare Proactive security Intrusion tolerant DSPS(Database Security and Protection System)
下载PDF
A reference model for database security proxy 被引量:1
7
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第1期30-36,共7页
How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat... How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer. 展开更多
关键词 information warfare database security FIREWALL reference model security proxy
下载PDF
Design and implementation of coal mine safety management system based on Ajax and RFID
8
作者 Zhentao Ni Jiantao Zhao Chang Liu 《International Journal of Technology Management》 2013年第8期122-124,共3页
This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing... This paper describes the design and implementation of a coal mine safety management information system based on Ajax. The whole system includes two alarm processing subsystem and management subsystem. Alarm processing subsystem in the server, used to analyzed monitoring data of underground mine, judged whether it is in an abnormal state, also including the crews time recorded by RFID, so that timely alarm data is written to the database for the use of management infonlaation system; management information system adopts the three layer system structure based on B/S, the client the use of ax technology for an asynchronous request to the server, the server operation backstagc Oracle database to complete the business logic processing, and the results in XML form and return it to the client, the subsystem to the user to provide an interactive platform, users can monitor the underground state in real time, at the same time when the abnormal status, the system can timely alarm, prevent the occurrence of coal mine accidents. 展开更多
关键词 coal mine safety information management Ajax: RFID
下载PDF
Research on the Office Automation System Development and Practice based on Database Optimization and Security Enhancement Technology
9
作者 HongLan Li 《International Journal of Technology Management》 2015年第11期23-25,共3页
In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of compute... In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of computer technology and puts forward a new concept, the abbreviation for OA, refers to the enterprise through the use of advanced science and technology, the allocation of the information resources in a reasonable manner, so as to improve the work efficiency and quality of staff, auxiliary management to make decisions, to obtain more economic benefits and main including images, text, audio, data and other information collection, and processing and storage. Among them, the office automation is based on the staff as the main body, with advanced scientific technology by combining with computer technology and form comprehensive office mode. Our proposed method serves as the novel paradigm for the development of the office automation which is meaningful. 展开更多
关键词 Office Automation System Database Optimization Security Enhancement.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部