期刊文献+

大数据背景下数据库安全保障体系研究 被引量:13

Research on Database Security Control System Against Backdrop of Big Data
在线阅读 下载PDF
导出
摘要 结合数据库技术发展的方向和趋势,从数据库的建、管、用的角度,提出了在大数据背景下,应从完善数据库系统外部环境、运用技术手段、落实管理机制、加强审计追踪和全面备份数据等方面建立数据库安全保障体系,以此来提高数据库安全保障水平。 Combined with the development trend of database technology, from the perspective of database construction, management and utility,the database security control system against backdrop of Big Data is established by Improvement of the database system external environment, using of technical means, implementation of management mechanism, strengthening the audit trail and full database backup,to enhance the security of database security level.
作者 冯勤群
出处 《软件导刊》 2013年第1期156-158,共3页 Software Guide
关键词 大数据 数据库安全 管理 体系 Big Data Database Security Database Management Control System
  • 相关文献

参考文献10

二级参考文献74

  • 1萨师煊 王珊.数据库系统概论[M].北京:高等教育出版社,1990..
  • 2宁洪,等.数据库系统[M].北京:电子工业出版社,2004.
  • 3天鸿工作室.Oracle9i SQL与PL/SQL开发指南[M].北京:清华大学出版社,2005.
  • 4[6]B Schneier. Applied Cryptography [ M]. USA: John Wiley & Sons, Inc.1996.
  • 5[7]Radu Sion, Mikhail Atallah, Sunil Prabhakar. On watermarking numeric sets [ A]. Proceedings of the Workshop on Digital Watermarking [ C ].USA: IWDW. 2002.
  • 6[1]Stefan Katzenbeisse, Fabien A P Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking [ M ]. Boston, London: Artech House, 1999.
  • 7[3]Rakesh Agrawal, Jerry Kiernan. Watermarking Relational Databases[A]. Proceeding of the 28th VLDB Conference [ C]. Hongkong, China:28 VLDB, 2002.
  • 8[4]Radu Sion, Mikhail Atallah, Sunil Prabhakar. Rights protection for relational data [ A ]. Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data San Diego [ C ]. California: ACM SIGMOD,2003.98- 109.
  • 9[5]M Atallah, S Wagstaff. Watermarking with quadratic residues [ A ].Proc. of IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents [ C]. USA:SPIE, January 1999.
  • 10[OL].<http://hadoop.apache.org.>.

共引文献728

同被引文献71

  • 1张玉萍,钱文仲,翁焱,张平波.教学文件档案管理信息检索系统的构建[J].安徽工业大学学报(社会科学版),2004,21(3):105-106. 被引量:2
  • 2鲁耀斌,周涛.B2C环境下影响消费者网上初始信任因素的实证分析[J].南开管理评论,2005,8(6):96-101. 被引量:97
  • 3邵兵家,孟宪强,张宗益.中国B2C电子商务中消费者信任前因的实证研究[J].科研管理,2006,27(5):143-149. 被引量:42
  • 4袁春,文振焜,张基宏,钟玉琢.基于密码学的访问控制和加密安全数据库[J].电子学报,2006,34(11):2043-2046. 被引量:12
  • 5Davis F D. Perceived usefulness, perceived ease of use,and user acceptance of information technology [J]. MIS Quarterly, 1989,13(3) :319 - 340.
  • 6Pavlou P A. Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model E J]. International Journal Electronic Commerce,2003,7(3) : 101 - 134.
  • 7Komiak S Y X, Benbasat I. The effects of personalization and familiarity on trust and adoption of recommendation agents [J]. Management Information Systems Quarterly, 2006, 30 (4): 941 - 960.
  • 8Xiao S, Benbasat I. The formation of trust and distrust in recommendation agents in repeated intractions: a process- tracing analysis [C] // Proceedings of the 5th International Conference on Electronic Commerce. New York: ACM, 2003:287 - 293.
  • 9Liang T P,Lai H J, Ku Y C. Personalized content recommendation and user satisfaction: theoretical synthesis and empirical findings [J]. Journal of Management Information Systems, 2006, 23 (3): 45 - 70.
  • 10Childers T L, Carr C L, Peck J, et al. Hedonic and utilitarian motivations for on-line retail shopping behavior[J]. Journal of Retailing, 2010,77 (4) : 511 - 535.

引证文献13

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部