Font Size: a A A

The Research And Implementation Of Core Techniques In Secure Database

Posted on:2007-11-30Degree:MasterType:Thesis
Country:ChinaCandidate:X Y TanFull Text:PDF
GTID:2178360218457274Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology, computer has come into manyareas of modern society and everyday life. Now, in our country, a lot of informationinfrastructure are under construction and many new services such as electroniccommerence, remote education, electronic cash, etc are supplied by internet. Due to theurgent demand on high-security DBMS and the government's policy of developinginformation security product, it is significant to make research on secure DBMS, both intheory and application.Based on a plenty of papers, technology reports and dissertations, thesedissertations make soine research woks on some techniques of secure databasemanagement system, such as access control, covert channel analysis and inferencecontrol. With the reality of our country, the author has done much research on how tostrengthen the security of OscarSec.In the article, the author firstly analysis the basic requirements of security databasesand its present domestic and overseas condition, and emphasizes on introducing thecontent of this article.In the next three chapters, the author respectively discusses the extention andfulfillment of access control technology, covert channel and inference control. OscarSecadopts DAC, MAC, RBAC and on the basis of these technologies it alos offers themultilevel particlesize control-attribute, record and element. Through the appliance ofdynamic policy management technology, we sufficiently improve the utility andflexibility of access control. In OscarSec, in order to solve the problem of covert channel,we select the method of CFT to analysis the covert channel and we preliminarily solve the security problem of covert channel. As for inference respect, we conduct the detailedtheoretical study and preliminarily realize the dynamic control to the inferenceproblem. the fulfillment of MAC, covert channel analysis and inference control marksthat the OscarSec has already reached to B2 level of TCSEC/TDI and the forth levelstandard of the trade security standard of the People's Republic of China-《TheTechnological Level of the Grade Protection Database Management Systems ofComputer Information System Security》.At the end of the article, the author summarizes the advantages and innovation ofthe security technology applying in the OscarSec. As for the defects, the author putsforwards the future program of improvement.
Keywords/Search Tags:database security, security policy, access control, covert channel anylisis, inference control
PDF Full Text Request
Related items