期刊文献+

数据库漏洞分类研究 被引量:1

The Classified Researches on Database Vulnerability
在线阅读 下载PDF
导出
摘要 数据库漏洞是数据库系统受到攻击的主要原因,通过研究数据库漏洞分类,有助于人们对漏洞的深入理解并加以预防和避免。该文从管理员的角度对数据库系统漏洞进行分类,在此基础上实现了数据库安全扫描系统,有效地保障了数据库系统的安全。 The vulnerability of database is the main reason that a database system is easily under external attack. Through the research on the classification of different types of specific vulnerabilities, people could benefit from solid understanding about database vulnerability, then they will know how to prevent from or avoid unexpected attack better. By reading this paper, you could see the classification of various vulnerabilities from the perspective as a system administrator or database administrator. Based on the classification, we make up a simple scanning system of database security, which can ensure the security of a database.
作者 杨斯杰 武文斌 YANG Si-jie, WU Wen-bin (1.School of Information, Beijing Forestry University, Beijing 100083, China; 2.Tsinghua University, Beijing 100084, China)
出处 《电脑知识与技术》 2010年第9期6905-6906,共2页 Computer Knowledge and Technology
关键词 数据库安全 数据库漏洞 分类方法 database security database vulnerability means of classification
  • 相关文献

参考文献8

  • 1Abbott R P,Chin J S,Donnelley J E,et al.Security Analysis and Enhancements of Computer Operating Systems[J].NBSIR 76-1041,Institute for Computer Sciences and Technology,National Bureau of Standards (Apr.1976).
  • 2Bisbey R,Hollingsworth D.Protection Analysis Project Final Report[R].Information Sciences Institute,University of Southern California,Marina Del Rey,CA,1978.
  • 3Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies[R].Technical Report CSE-96-11,1996.
  • 4Christey S.The Preliminary List of Vulnerability Examples for Researchers[EB/OL].http://cve.mitre.org/docs/plover/.(March 2006).
  • 5Weber S,Paul A,Paradkar A.A,Software Flaw Taxonomy:Aiming Tools At Security"Software Engineering for Secure Systems-Building Trust worthy Applications(SESS'05).
  • 6单国栋,戴英侠,王航.计算机漏洞分类研究[J].计算机工程,2002,28(10):3-6. 被引量:58
  • 7戴瑞恩.一种新型的基于规则实现的数据库安全检测方法[D].北京:清华大学,2003.
  • 8蔡义望.数据库安全检测系统设计与实现[D].北京:清华大学,2002.

二级参考文献6

  • 1[3]Bishop M,Bailey D.A Critical Analysis of Vulnerability Taxonomies. Department of Computer Science at the University of California at Davis, 1996
  • 2[4]Aslam T,Krsul I.Use ofa Taxonomy of Security Faults. Eugene Spaff ord.In Proceedings of the 19th National Information Systems Security Conference,1996
  • 3[5]Krsul 0Software Vulnerability Analysis. Department of Computer Scie nces, Purdue University, 1998
  • 4[6]Knight E.Computer Vulnerabilities.http://www.securityparadigmcom/, 2000
  • 5[1]Denning D E.Cryptography and Data Security. Addison-Wesley Publis hing Company, 1983
  • 6[2]Marick B.A Survey of Software Fault Surveys. University of Illinois at rbana-Champaign, 1990

共引文献57

同被引文献15

  • 1Abbott R,Chin J,Donnelley J,et al.Security Analysis andEnhancements of Computer Operating Systems[R].Washington DC,USA:US Department of Commerce,1976.
  • 2Bisbey II R,Hollingworth D.Protection Analysis:FinalReport[R].Marina Del Rey,USA:University of SouthernCalifornia,1978.
  • 3Bishop M,Bailey D.A Critical Analysis of VulnerabilityTaxonomies[R].Davis,USA:University of California atDavis,1996.
  • 4Christey S.The Preliminary List of Vulnerability Examplesfor Researchers[R].Bedford,USA:Mitre,2006.
  • 5Landwehr C,Bull A,Mcdemott J,et al.A taxonomy ofcomputer program security flaws[J].ACM ComputingSurveys,1994,26(3):211-254.
  • 6Aslam T,Krsul I,Spafford E.Use of a Taxonomy ofSecurity Faults[R].West Lafayette,USA:PurdureUniversity.1996.
  • 7CHEN Zhongqiang,ZHANG Yuan,CHEN Zhongrong.Acategorization framework for common computer vulnerabilitiesand exposures[J].The Computer Journal,2010,53(5):551-580.
  • 8LI Zhenmin,TAN Lin,WANG Xuanhui,et al.Have thingschanged now?An empirical study of bug characteristics inmodern open source software[C] //Proceedings of the 1stWorkshop on Architectural and System Support forImproving Software Dependability.San Jose,USA:ACM,2006:25-33.
  • 9Li Y L.An Approach towards Standardising VulnerabilityCategories[D].Pretoria,South Africa:University ofPretoria,2007.
  • 10刘晖,曹伟.国家漏洞库漏洞数据分析[C] //第二届信息安全漏洞分析与风险评估大会.北京:清华大学,2009:363-370.

引证文献1

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部