Font Size: a A A

The Database Security Technology Research And Application

Posted on:2016-07-22Degree:MasterType:Thesis
Country:ChinaCandidate:G YangFull Text:PDF
GTID:2428330482981303Subject:Systems analysis and integration
Abstract/Summary:PDF Full Text Request
With the development of information industry in our country,database is more and more widely used.At the same time,because of the complex network environment,the database data is more and more threatened by attack thus,the research of database security technology has been an important branch in the field of computer technology.Now most database systems use foreign Produet.in our country.It should be solved how to ensure secure use and audit effectively.Based on a plenty of papers,technology reports and dissertations,this dissertations make some research work on the field of secure theory and technology and study on secure enhancement based on oracle database system.At last,a practical database application is realized.The main points are as follows:1.The research and development of information security are discussed.The situation of database security these days was introduced.A world of data security risks are analyzed from many dimensions.The characteristics and fundamental requirement of database security issues are proposed.For oracle database,the aspects of privilege admin based on roles the granularity access control,audit and backup and restore technology are discussed.2.Based on oracle database,database storage and transmit authentication,users password authentication,secure audit are realized.Database security functions improve by procedure,function and program packages.3.Discussing the security and rebutted of key function of a database system.A model which is to defense intrusion in outer layer,to detection intrusion in the middle layer and to tolerate intrusion in the inner layer is given.It utilizes the techniques of both redundancy and diversity and integrates the techniques of detection intrusion and intrusion tolerant.
Keywords/Search Tags:database, security, security enhanced, oracle, encryption, intrusion tolerant
PDF Full Text Request
Related items