Font Size: a A A

Research On The Security Technology Of Web-based Network Database

Posted on:2004-08-08Degree:MasterType:Thesis
Country:ChinaCandidate:X D LiuFull Text:PDF
GTID:2168360092497718Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
In the information-globalized days, the application of network database makes resource and data communications share to be realized, which is very significant for people to enhance work efficiency and economize work cost. However, because Internet is an information resource open to different class in society, while network database brings people convenience, it also results in many secure problems. This threatens people's natural work activity from network database greatly. Thus, how to ensure the security of network database becomes a significant problem when us design it.On the ground of the construction of China Powder Industry Information Web, this paper analyzes and designs the security of network database, and it mainly includes the following content:1. The paper analyzes the current research actuality of network database, and brings forward the general security model of network database.2. The paper analyzes the current usual technologies of Web, and studies the functional structure of firewall defense system of the Web emphatically and network isolation technology particularly, then puts forward the network security structure of the Web. The network security system structure has sound security.3. The paper realizes the design of Web database. On the basis of the database, studies smart card identity identification technology thoroughly. On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method. The identification of secret information combined with Smart Card is new kind identity identification technology adapting to requesting database for sensitive information, which can acquire secure data communications.4.The paper analyzes role-based access control (RBAC) technologies and puts forward role-based control secure database management system model. According to the model, the paper divides client accessing the web database into ordinary user, member user and web administrator three types with different authorities. Ordinary user owns ordinary information authority of accessing to web; member user has the authority of accessing to both ordinary and sensitive information; while web administrator owns the super administration authority.On the basis of the above resolution, the paper constructs user-role mapping table and role authorization table. By the role number of role authorization table, Certification Server can use different security-class identification technologies according to diverse users dynamically, and decides responding authorization with the identification results. This method can be realized by program without dependence on concrete database.In the end, the paper introduces the realization of database security system. The systemcan offer such functions as identity identification, role authorization and log records. The network database security resolution presenting by the paper can safeguard the security of network database completely.
Keywords/Search Tags:Network database security, Network isolation, Smart card, Role-based access control, Identity identification
PDF Full Text Request
Related items