Font Size: a A A

Database Security Access Middleware Technology Research And Development

Posted on:2005-06-07Degree:MasterType:Thesis
Country:ChinaCandidate:J QiaoFull Text:PDF
GTID:2208360152956586Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With IT developing and amount of information increasing, the database play more and more important part in memorizing and managing mass data. For this reason, it has become a target hacker attacks. Recently, It is often happened that the hacker attacks and destroys database. Sometime, these accidents cause network system to be broken.The importance of database security tell us that we must spend a great quantity of human resources and money to protect database security. How to guarantee sharing data and its safety in database is our task. In the text, we analyzed and researched security vulnerability and security tactics of database. After that, the middleware accessing database is presented. The middleware is placed in middle of shared database and client. Only client has passed the middleware, the database can be accessed with the result that database is protected.The text is divided into six parts. In the first part, the importance of database security was described. The status, policy and middleware technology of database security are discussed and compared in second part. The software and hardware platforms developing middleware for database security ware introduced in three part. We introduced technology scheme to be chosen and major technology to be used in four part. Developing procedure of program and performance module to be developed are described in fifth part. Finally, using explain for performance module was introduced in sixth part.In process developing program, two operating systems are used. They are Linux and Windows XP. Sybase database is used as background database. Developing program is completed on the transport layer. We used socket technology and C++ language. The programs have realized dialog for port to port, cooperation between procedures and data encryption. The text relates to wide fields of technology and applications on new technology. After a number of problems to be solved, requirements assigned are realized...
Keywords/Search Tags:Database, Security access, Middleware, Socket
PDF Full Text Request
Related items