期刊文献+

数据库管理系统的入侵容忍技术研究进展 被引量:6

The State of the Art of Database Intrusion Tolerance Research
在线阅读 下载PDF
导出
摘要 传统数据库安全的研究重点是如何防止非授权用户对数据库的恶意干扰和破坏,事实上根本无法阻止所有的攻击。因此,在信息战语义下,更为紧迫的是如何找到有效的措施来缓解或消除恶意用户的攻击,而入侵容忍(即抗恶意用户攻击和攻击后DBMS的恢复能力)是数据库安全最为重要的。本文概述了信息战中数据库入侵容忍技术研究的现状,指出了目前存在的问题和未来的研究方向。 Traditional database security focuses on how to prevent the unauthorized users from stealing data and making damage to data. It can not do anything to mitigate the damage caused by malicious authorized users. Especially in information warfare context, it is more urgent to find effective measures to alleviate or eliminate the damage caused by malicious authorized users. Information Warfare has been one new challenge of Database Security research. In information warfare context, Database Intrusion Tolerance, the ability of anti-malicious authorized users attacks and post-attacks recovery of DBMS, is an emergent principle of database security. It can enhance database survivability. In this paper, we survey the state of the art of database intrusion tolerance in information warfare and present some open problems and possible future research directions.
出处 《计算机科学》 CSCD 北大核心 2004年第4期14-18,共5页 Computer Science
基金 国家"863’高技术(NO:2001AA144010)经费资助
关键词 数据库管理系统 入侵容忍技术 应用程序 数据库系统 Information warfare, Database security, Intrusion tolerance, Malicious authorized users, Trusted recover
  • 相关文献

参考文献22

  • 1Jones A. Information Warfare--What is it?: [Information Security Technical Report]. Elsevier,1999,4(3) :12-19
  • 2Waltz E. Information Warfare: Principles and Operations. Boston London, USA. Artech House, 1998
  • 3Graubart R, Schlipper L, McCollum C. Defending Database Management Systems Against Information Warfare Attacks:[Technical Report]. The MITRE Corporation, 1996
  • 4Jajodia S, Ammann P, McCollum C D. Surviving information warfare attacks. IEEE Computer, 1999,32(4): 57-63
  • 5Anderson R H. Research and Development Initiatives Focused on Preventing, Detecting, and Responding to Insider Misuse of Critical Defense Information Systems: Results of a Three-Day Workshop. RAND CF-151-OSD, 1999
  • 6Insider Threat Integrated Process Team, Department of Defense (DoD-IPT), 2000. Available at http://www. c3i. osd. mil
  • 7DoD Insider Threat Mitigation. U.S. Department of Defense,2000. Available at http://www. c3i. osd. mil
  • 8Lee P A,Anderson T. Fault Tolerance: Principles and Practice.Springer-Verlag, Wien, Austria, second edition, 1990
  • 9Bernstein P A, Hadzilacos V,Goodman N. Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading,MA, 1987
  • 10Gray J, Reuter A. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, San Mateo, CA,1993

二级参考文献2

共引文献22

同被引文献45

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部