Font Size: a A A

Analysement And Designment Of Secure And Embedded Database Management System

Posted on:2009-11-20Degree:MasterType:Thesis
Country:ChinaCandidate:W L ZhuFull Text:PDF
GTID:2178360242497729Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of embedded Internet and the demand of dealing with a great deal of data, the software system in the field of electric power meets new problems, the security of data processing. So come embedded and secure database management system. The article analyses and designs a safe embedded database management system, which is with the electric power field. In order to be described easier, it is called ESDBMS. It can not only satisfy the functionality demand but also assure the security.The paper firstly introduces the history, actuality and trend of embedded database management system, then describes the background of the article and points out the meaning of ESDBMS in practicability and science study.In the integer design of ESDBMS, at first, the paper introduces the design principle of embedded database management system and secure database management system, then analyses the demand of electric power field, designs the whole frame of system, divides the system into many modules and confirms the function of every module. The article mainly finishes the design and program of safe backend module, analyses safe database engine module and designs the safe front-end module and safe transaction module.In the design and realize of safe backend module, the article analyses the scheme of cache management and the method of row organized and selects the suitable way. Besides that, it designs the object-renew mechanism and realizes the encryption of database.In the safe database engine module, the paper uses the manifest type of row format. That solves the problem of abandoning data, which is not suitable of the prescribed type. The safe front-end module combines the user authentication and discretionary access control mechanism of operation system, which avoids the redundancy of security.In the safe transaction module, paper firstly analyses the realizing method of concurrency control, then analyses the locks between operation system and database management system, finally designs the log management and transaction processing, which assures the security and integrality of data.At last, the paper analyses the flow of execution, builds the flat of testing, institutes the testing method of the safe backend module and discretionary access control mechanism and analyses the results.
Keywords/Search Tags:embedded database, DBMS, EDBMS, safe database, DAC, encrtpt
PDF Full Text Request
Related items