Font Size: a A A

Research And Implementation Of Distributed Database Security Mechanisms

Posted on:2007-11-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2208360215498431Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The security problem of database is always a tough question of database managementresearch. Along with the database technology widely using in business field, therequirement for data share to users is stronger and stronger, it is a very important to makesure of these data being used safely. On the one hand, it requires DBMS provide a securitystrategy to make sure of data to be used safely; On the other hand, because ofbrowser/server technology developing and consummating, DBMS often runs at server,which security is provided by itself. But client application runs at client, its security can bedesigned by application programmer, which is used to prevent users which have no accessauthority from executing program model. Therefore, how to compose efficiently thesecurity strategy of background DBMS with the one of foreground application into anentire security system, and boost up the security of application system, come into being avery important question for database application system designing.In this article, based on Oracle data base of distributing system and practicalengineering projects, focused on several main security which easily happen during systemoperates, some methods to solve the problems are provided, and discusses of the datasecurity management strategy from every side of user management, authority management,view management, rule management, audit monitor, data dictionary track, these technologyall be realized in a DDBD data security control system named QYKJ-MIS.
Keywords/Search Tags:Data Security, Authority Management, User Management, Security Strategy, DDBD
PDF Full Text Request
Related items