期刊文献+
共找到2,320篇文章
< 1 2 116 >
每页显示 20 50 100
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
1
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare Proactive security Intrusion tolerant DSPS(database security and Protection System)
在线阅读 下载PDF
A reference model for database security proxy 被引量:1
2
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第1期30-36,共7页
How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat... How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer. 展开更多
关键词 information warfare database security FIREWALL reference model security proxy
在线阅读 下载PDF
Research and Practice on Security Protection and Disaster Recovery Strategy of Oracle Database in Colleges and Universities 被引量:1
3
作者 Man Liu Lei Yu 《Intelligent Information Management》 2022年第2期71-79,共9页
Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm... Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities. 展开更多
关键词 Oracle database security Protection database Backup Disaster Recovery Colleges and Universities
在线阅读 下载PDF
Database Security and Supervisory Method in Oracle 被引量:1
4
作者 孙莉 《Journal of China Textile University(English Edition)》 EI CAS 1999年第1期78-80,共3页
This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database system. This paper also gives an example of making use of... This paper discusses how to use the security measurements, such as privileges, roles, views, stored procedures and triggers, to ensure the safety of a database system. This paper also gives an example of making use of some special views of ORACLE DATA DICTIONARY to track the security records of a database system. 展开更多
关键词 database security VIEW PRIVILEGE .
在线阅读 下载PDF
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning 被引量:2
5
作者 Yong Wang Jinsong Xi Tong Cheng 《Journal of Information Security》 2021年第1期34-55,共22页
As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of databa... As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of database security research is to prevent the database from being illegally used or destroyed. This paper introduces the main literature in the field of database security research in recent years. First of all, we classify these papers, the classification criteria </span><span style="font-size:12px;font-family:Verdana;">are</span><span style="font-size:12px;font-family:Verdana;"> the influencing factors of database security. Compared with the traditional and machine learning (ML) methods, some explanations of concepts are interspersed to make these methods easier to understand. Secondly, we find that the related research has achieved some gratifying results, but there are also some shortcomings, such as weak generalization, deviation from reality. Then, possible future work in this research is proposed. Finally, we summarize the main contribution. 展开更多
关键词 database security Threat Agent Traditional Approaches Machine Learning
在线阅读 下载PDF
Security Research on Engineering Database System
6
作者 REN Jian-ping 1,2, SONG Han-tao 2, LIANG Yun-rong 2 (1. North China Institute of Technology, Taiyuan 030051, China 2. Beijing Institute of Technology, Beijing 100081, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期288-289,共2页
Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database ma... Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments. 展开更多
关键词 engineering database management system (EDBMS) s ecurity agent security level
在线阅读 下载PDF
Soil Database Management Software Development for Optimizing Land Resource Information Utilization to Support National Food Security
7
作者 Rizatus Shofiyati Saefoel Bachri 《Journal of Geographic Information System》 2011年第3期211-216,共6页
Since land resource database development in 1987/1988, a large amount of digital data in spatial, tabular and metadata format has been collected and generated. There are some application softwares of soil database to ... Since land resource database development in 1987/1988, a large amount of digital data in spatial, tabular and metadata format has been collected and generated. There are some application softwares of soil database to manage such a large amount of data, i.e.: Side & Horizon (SHDE4), Soil Sample Analysis (SSA), and Land Unit in dbf file, while Site and Horizon is in DataEase formats. The database contains soil physics and chemical property data of each soil horizon from surface to effective soil depth, climate, land surface condi- tions, and other parameters required for soil classification. Currently, database management software for land resources is still based on DOS and is stand alone. The system is not efficient and effectively used as Agri- cultural Land Resource Information System. At present, as a key component of this system requires review and development of new database software is compatible with the development of information technology. This paper explains about development of interactive agricultural land resources information system for op- timizing land resources data utilization. Hopefully, the software can give contributions in national Agricul- tural Land Resources System Information development for supporting food security. 展开更多
关键词 SOIL database Software DEVELOPMENT LAND RESOURCES Information FOOD security
暂未订购
Quantitative Security Evaluation for Software System from Vulnerability Database
8
作者 Hiroyuki Okamura Masataka Tokuzane Tadashi Dohi 《Journal of Software Engineering and Applications》 2013年第4期15-23,共9页
This paper proposes a quantitative security evaluation for software system from the vulnerability data consisting of discovery date, solution date and exploit publish date based on a stochastic model. More precisely, ... This paper proposes a quantitative security evaluation for software system from the vulnerability data consisting of discovery date, solution date and exploit publish date based on a stochastic model. More precisely, our model considers a vulnerability life-cycle model and represents the vulnerability discovery process as a non-homogeneous Poisson process. In a numerical example, we show the quantitative measures for contents management system of an open source project. 展开更多
关键词 QUANTITATIVE security Evaluation VULNERABILITY database NON-HOMOGENEOUS POISSON Process CONTENTS Management System
在线阅读 下载PDF
Research on the Office Automation System Development and Practice based on Database Optimization and Security Enhancement Technology
9
作者 HongLan Li 《International Journal of Technology Management》 2015年第11期23-25,共3页
In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of compute... In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of computer technology and puts forward a new concept, the abbreviation for OA, refers to the enterprise through the use of advanced science and technology, the allocation of the information resources in a reasonable manner, so as to improve the work efficiency and quality of staff, auxiliary management to make decisions, to obtain more economic benefits and main including images, text, audio, data and other information collection, and processing and storage. Among them, the office automation is based on the staff as the main body, with advanced scientific technology by combining with computer technology and form comprehensive office mode. Our proposed method serves as the novel paradigm for the development of the office automation which is meaningful. 展开更多
关键词 Office Automation System database Optimization security Enhancement.
在线阅读 下载PDF
Computer Network and Database Security Technology Optimization
10
作者 Kachen Zhang 《Journal of Electronic Research and Application》 2024年第6期188-193,共6页
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens... With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel. 展开更多
关键词 Computer network and database security technology Optimized path
在线阅读 下载PDF
Advancing the database security of multi-round quantum private query protocols
11
作者 Fei Gao 《Science China(Physics,Mechanics & Astronomy)》 2025年第8期274-275,共2页
Quantum private query(QPQ)protocols have emerged as a pivotal innovation in quantum cryptography,offering users the ability to retrieve specific database information while preserving privacy.However,the practical impl... Quantum private query(QPQ)protocols have emerged as a pivotal innovation in quantum cryptography,offering users the ability to retrieve specific database information while preserving privacy.However,the practical implementation of these protocols faces significant security challenges,particularly from joint-measurement attacks in multi-round query scenarios.A recent study by Liu et al.addresses these vulnerabilities through a comprehensive analysis and proposes innovative solutions,marking a critical advancement in the field[1]. 展开更多
关键词 joint measurement attacks quantum private query quantum cryptography quantum cryptographyoffering database security multi round protocols retrieve specific database information security challenges
原文传递
基于MIS系统的存储过程技术和游标技术的应用 被引量:2
12
作者 刘辉 《福建电脑》 2010年第1期138-139,共2页
在MIS系统中,使用存储过程可以优化对数据库的访问,恰当地使用存储过程,既可以简化应用程序的开发,又可以增强MIS系统的灵活性与安全性。
关键词 存储过程 游标 mis database
在线阅读 下载PDF
一个物流管理信息系统NDLMIS的设计及其实现 被引量:7
13
作者 王崇骏 刘向东 +2 位作者 尹旭日 谢琪 陈世福 《计算机应用与软件》 CSCD 北大核心 2003年第8期14-15,51,共3页
本文在叙述了物流管理信息系统的结构及其特点的基础上 ,提出了基于混合B/S方式的结构框架 。
关键词 物流管理信息系统 NDLmis 设计 计算机 管理信息系统
在线阅读 下载PDF
一种基于ASP技术的Web MIS安全系统的设计和实现 被引量:13
14
作者 张先跃 高城 崔汉国 《计算机工程》 CAS CSCD 北大核心 2002年第2期162-164,共3页
简要介绍了技术,通过总结体系结构下系统的开发经验,讨论了基于技术下的系统安全策略、 ASPBrowser/ServerMISASPWeb MIS安全系统的设计与实现方法。
关键词 ASP WEB mis 信息安全 管理信息系统 计算机
在线阅读 下载PDF
一个客户/服务器MIS系统开发中的若干数据库设计问题 被引量:2
15
作者 胡乃静 王宇君 朱扬勇 《计算机工程》 EI CAS CSCD 北大核心 1998年第11期13-15,共3页
考察了一个实际的信息系统,分析了数据库设计中的需求分析、整体设计、关系表确立等方面出现的问题、并提出解决方案、以使开发人员在数据库设计时避免这些问题,设计一个适用的数据库.
关键词 数据库 设计 管理信息系统 客户/服务器 mis
在线阅读 下载PDF
基于C/S体系结构的集装箱MIS系统设计 被引量:8
16
作者 黄琪 黄卜夫 《计算机工程与应用》 CSCD 北大核心 2003年第3期211-212,215,共3页
该文根据集装箱管理的实际需要,结合网络、数据库、计算机、优化等技术,提出并实现了基于C/S体系结构的集装箱管理信息系统。在此系统的设计与实现过程中,较为详细地分析了系统功能结构、数据库优化、权限管理、ODBC等关键技术,并结合... 该文根据集装箱管理的实际需要,结合网络、数据库、计算机、优化等技术,提出并实现了基于C/S体系结构的集装箱管理信息系统。在此系统的设计与实现过程中,较为详细地分析了系统功能结构、数据库优化、权限管理、ODBC等关键技术,并结合实际对有关设计工作进行了说明。 展开更多
关键词 体系结构 集装箱 系统设计 mis 管理信息系统 ODBC 客户/服务器
在线阅读 下载PDF
上海交大基于校园网的MIS建设规划 被引量:14
17
作者 蒋磊宏 董传良 钟华 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2001年第z1期10-14,共5页
针对上海交大多校区、地域分散的特点,介绍了基于Internet/Intranet的管理信息系统建设规划。阐述了系统的建设目标、建设原则、子系统划分以及多层软件体系结构、分布处理技术、安全策略、DCOM/CORBA等技... 针对上海交大多校区、地域分散的特点,介绍了基于Internet/Intranet的管理信息系统建设规划。阐述了系统的建设目标、建设原则、子系统划分以及多层软件体系结构、分布处理技术、安全策略、DCOM/CORBA等技术在系统中的应用设计方案。 展开更多
关键词 管理信息系统(mis) 多层结构 分布信息处理 安全策略 DCOM COBRA
在线阅读 下载PDF
GIS与MIS系统集成技术在城市规划中的研究与应用 被引量:12
18
作者 颜涯 邵佩英 《计算机仿真》 CSCD 2001年第5期76-79,共4页
该文介绍了北京市规划委员会在建立了GIS和MIS两种跨平台的大型数据库后 ,如何综合利用Oracle、SDE和MO实现跨平台、跨数据库的系统集成工作 ,实现了规划管理信息系统“图文一体化”的设计目标。
关键词 GIS mis 系统集成 数据库 城市规划 地理信息系统
在线阅读 下载PDF
基于ASP技术的牵引供电运营MIS的设计和开发 被引量:2
19
作者 王丹 汪大全 高仕斌 《继电器》 CSCD 北大核心 2002年第11期27-29,共3页
介绍了ASP技术的原理。针对牵引供电运营MIS(PTO MIS)的设计 ,提出了它的网络拓扑结构和软件模块结构 ,同时对ASP技术在牵引供电运营MIS中的应用进行了探讨。详细阐述了ASP与数据库进行数据交互的原理和实现方法 。
关键词 ASP 牵引供电运营系统 mis 设计 开发 数据库 管理信息系统
在线阅读 下载PDF
中小企业MIS中物资管理系统的设计与实现 被引量:7
20
作者 陈桦 张鹏伟 陈景霞 《陕西科技大学学报(自然科学版)》 2003年第6期78-81,共4页
对比分析了中小企业MIS中的传统技术C/S与新型技术B/S,提出了基于B/S模式的中小企业MIS中物资管理系统的系统模型与实现方案,并且介绍了用SQLServer和Delphi中的ADO控件设计物资管理系统数据库的方法与过程。
关键词 中小企业 mis 物资管理系统 设计 B/S模式 系统模型 数据库
在线阅读 下载PDF
上一页 1 2 116 下一页 到第
使用帮助 返回顶部