Font Size: a A A

Research And Realization Of The Network Database Security Mechanism

Posted on:2007-06-01Degree:MasterType:Thesis
Country:ChinaCandidate:X P ZhuFull Text:PDF
GTID:2178360185996918Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Network database is the information warehouse under opening condition,which manages a lot of datum.On the same time.it has to be confronted with various security attack.Once the data information in the network database was lost,damaged or juggled,it would make enormous loss.Today,thesecurity management of network database is become more and more important.The security mechanism of network database is related with many aspects.Though the analysis of architecture and software arrangement,I divide this problem into four layers: network security mechanism,DBMS security mechanism,operation system(server)security mechanism and application system security mechanism.Each aspect is the hotspot of the security research nowadays.On one hand,I'm study the Network Teaching System to realize the security access control;on the other hand,this thesis combined with the encryption techniques,identification techniques and access control theory etc,mainly makes research on the access control in the security mechanism of server,client application and a rapidly developing DBMS —MySQL. It gives the way of design and realization of security control in network database application system.DBMS has its own security management,which prevent the non_accredited user from dealing with the datum in the database.The security problem of the application programme is to prevent the non_accredited user from doing the illogical application performance on application system.Its realization lies on the developer of the programmer.How to combine the security machanism of the DBMS and the application programme into an integrated and uniform security control system? The thesis puts forward an extended RBAC model.Its application way makes the authority and maintance easy.It is easy to control.and easy to explant.Finally the author uses part of the research result in a project—Network Teaching System to realize the security access control.
Keywords/Search Tags:B/S, C/S, RBAC, Identity authentication, Acess control
PDF Full Text Request
Related items