Font Size: a A A

The Study Of Security Framework For Distributed Database

Posted on:2007-04-10Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y L LiuFull Text:PDF
GTID:1118360185496500Subject:Information management
Abstract/Summary:PDF Full Text Request
Distributed database (DDB) system is becoming one of the most active IT fields with the quick development of computer network and communications technology and wide employment of satellite communications, cellular communications, LAN, WAN, Internet and Intranet. At current circumstance of Internet DDB become a share center of information resources, especially magnanimous information resources.DDB is combination of computer network and database system. Communications and network technology make DDB security more complex. It is a key problem how to ensure DDB security.This paper addresses the problems of DDB security from the viewpoint of information security management, establishes an iterative DDB security framework using PDCA method, which composed of 5 basic construction unit including security demands and security risk analysis, security model establishment, security implementation, backup and fault recovery and security detection and assessment, researches the five basic construction units. This paper firstly makes DDB security determines and researches from 4 aspects: security demands, security risks, security abilities and security services. Then security model PBSM-DDB (Policy-Based Security Model of Distributed Database) is brought forward to accurately describe DDB security demands with 9 formalized regulations. In security implementation unit 4 key features including data fragmentation and distribution, DBMS, data encryption and secure authentication are identified and researched. In the 4th unit distributed backup method and consistency of fault recovery are researched. In security detection and assessment unit a security detection method EASD-DDB (Executable Assertions-based Security Detection of DDB) is brought forward to detect DDB security at runtime. At last this paper gives a case demonstration of this framework and an expectation of farther research of this framework.The innovations might be seen as following in the dissertation:...
Keywords/Search Tags:distributed database, security framework, security model, information security management
PDF Full Text Request
Related items