Font Size: a A A

Database Security Theory Research And Instance

Posted on:2008-12-30Degree:MasterType:Thesis
Country:ChinaCandidate:J YuFull Text:PDF
GTID:2178360215469465Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The article introduces the status and development of database security technology, and analyzes mangy kinds of advanced security technology, and designs a data distribution security management system from the aspects of data encryption, identity authentication, access control, database administrator and security administrator roles separation.The article analyzes the system flow and data structure, and imposes a security mechanism of two element identity authentication using USBKEY, and makes use of RSA cryptography system to realize identity authentication. The system encrypts the sensitivity information in database so that there is no access without authentication in order to ensure the security access of the system. As for key management, it uses the technology of real time computing key to prevent hostility people analyzing proclaimed in writing. In aspect of data encryption, it uses the distribution encryption mechanism that security administrator owns the different operation fights of different fields, and using the RBAC (Role Based Access Control), giving different database users different encryption and decryption rights.
Keywords/Search Tags:information security, database security, database encryption
PDF Full Text Request
Related items