期刊文献+

异构数据库安全策略与安全技术述评 被引量:2

Review of Heterogeneous Database Security Strategies and Security Techniques
在线阅读 下载PDF
导出
摘要 本文通过分析异构数据库的特点及目前面临的安全性要求,提供了在异构数据库安全策略和安全技术上几种可行的方法,并比较分析了各自的特点,提出异构数据库安全策略要从权限控制、网络传输安全检测和数据存储加密技术三方面入手,才能比较好的保证异构数据库安全性的建议。 Based on the analysis of the characteristics of heterogeneous databases and current demands for data security, several feasible security strategies and techniques for it are provided with their features compared and analyzed and a suggestion that the security of heterogeneous databases can be secured only by carrying out security strategies in terms of access control, network transmission security test and data store encryption presented.
作者 王育英
机构地区 东北林业大学
出处 《林业劳动安全》 2006年第2期13-16,共4页 Forestry Labour Safety
关键词 异构数据库 安全技术 安全检测 数据加密 heterogeneous database security technique security test data encryption
  • 相关文献

参考文献3

二级参考文献19

  • 1(美)AnnNaverro.XML从入门到精通[M].北京:电子工业出版社,2000..
  • 2Chess D. Security Issues in mobile code systems. In: Vigna G ed. Mobile Agent Security, 1998. 1-14
  • 3Karnik N M, Tripathi A R. Design issues in mobile agent programming systems. IEEE Concurrency, 1998, 6(3) :52-61
  • 4Wilhelm U G, Saamann S M, Buttyan L. A pessimistic approach to trust in mobile agent platforms. IEEE Ccmputing, 2000,10(4) :40-48
  • 5Martin Schaaf, Frank Maure. Integrating Java and CORBA: A programmer' s perspective. IEEE Internet Computing, 2001,7 (1) :72-78
  • 6Wang X F, Yi X, Lam K Y. Secure information agent for inter net trading. In: Proc the 11th Australian Joint Conference on Artificial Intelligence'98, Brisban, Australia, 1998. 183-194
  • 7Farmer W M, Gutman J D, Swarup V. Security for mobile a gents: Authentication and state appraisal. In: Proc the 4th European Symposium on Research in Computer Security, Rome, Italy, 1996. 18-130
  • 8Bruce Eckel. Thinking in Java, 2nd Edition. New Jersey: Pren tice-Hall, 2000
  • 9Pfleeger C P. Security in Computing. 2nd Edition. Upper Sad dle River, New Jersey: Prentice Hall, 1997
  • 10Davies W, Price W L. Security for Computer Networks. Chich esfer: John Wiley & Sons, 1989

共引文献64

同被引文献16

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部