期刊文献+

同时保护数据库数据保密性和完整性的方法 被引量:5

Method for Simultaneous Protection of Data Confidentiality and Data Integrity in Database
下载PDF
导出
摘要 提出了一种基于数据库数据项的同时保护保密性和完整性的设计方法。在原有数据库表的基础上,增加了一个对应的校验表,校验表中存放的是原数据项的校验项,通过在校验项中引入行标识列和行连锁技术,在保护重要或敏感数据库数据保密性的基础上,可有效保护数据被非法修改、交换、添加和删除等篡改行为。对设计进行了效果验证和安全性分析。 This paper proposes a novel method that simultaneously assures data confidentiality and data integrity of data items. The basic idea of this method is adding a verification table to existing database tables, and the verification items for each original data item are stored in the verification table. By using the line label and line concatenation techniques, this method not only assures the confidentiality of a database that has important and sensitive data, but also effectively protects data from being modified, exchanged, added or deleted illegally. A formal analysis and verification of this method is provided.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第10期61-63,100,共4页 Computer Engineering
基金 河南省自然科学基金资助项目(0411013300) 河南省高等学校青年骨干教师基金资助项目(2005-174)
关键词 关系数据库 数据项 保密性 完整性 同时保护 Relational database Data item Confidentiality Integrity Simultaneous protection
  • 相关文献

参考文献10

  • 1Denning D E.Field Encryption and Authentication[C]//Proceedings of Crypto'83,Santa Barbara,CA.1983.
  • 2Jajodia S,Sandhu R.Toward a Multilevel Secure Relational Data Model[C]//Proc.of the ACM SIGMOD Conference.1991:50-59.
  • 3Daza V,Herranz J.A Distributed and Computationally Secure Key Distribution Scheme[EB/OL].2002.http://eprint.iacr.org/2002/069.
  • 4Jajodia S,Sandhu R.Polyinstantiation Integrity in Multilevel Relations[C]//Proc.of IEEE Symposium on Research in Security and Privacy.1990:104-105.
  • 5Jajodia S,Sandhu R.Integrity Mechanisms in Database Management System[C]//Proceedings of the 13th NINS-NCSC National Computer Security Conference.1990-10:526-540.
  • 6Benedikt M,Cheeyonyong C,Fan Wenfei,et al.Capturing Both Types and Constraints in Data Integration[C]//Proceedings of the ACM SIGMOD International Conference on Management of Data,San Diego,California,USA.2003:277-288.
  • 7胡东辉,周学海.计算机安全模型研究[J].小型微型计算机系统,2005,26(4):561-567. 被引量:3
  • 8McLean J.Security Models,Encyclopedia of Software Engineering[M].Wiley Press,1994.
  • 9徐立新,陈富民.一种基于在线招投标系统保护数据安全性的方法[J].计算机工程与应用,2005,41(13):147-149. 被引量:3
  • 10徐立新,吴相林,张新成.在线招投标系统中的加密和数字签名技术[J].计算机工程与设计,2005,26(6):1431-1433. 被引量:7

二级参考文献37

  • 1李增智,王美玲,王伟.数据库数据完整性的实现[J].微电子学与计算机,1995,12(5):24-27. 被引量:2
  • 2National Computer Security Center, Glossary of computer security terms[S]. NCSC-TG-04, October 1988.
  • 3Carle. Landwehr, A survey of formal models for computer security [Z]. Computer Science and Systems Branch Information Technology Division, September 30, 1981.
  • 4John McLean, Security Models, Encyclopedia of software engineering[M]. Wiley Press, 1994.
  • 5Lampson B W. Protection[C]. In:Proc. Fifth Princeton Symp.on Information Sciences and Syst, Mar. 1971.
  • 6Anderson J P. Computer security technology planning study Vol I[Z]. ESD-TR-73-51,NTIS # AD-758206, Electronic Systems Division, Air Force Systems Command, October 1972.
  • 7McLean J. Security models and information flow research in security and privacy[C]. Proceedings, 1990 IEEE Computer Society Symposium on , 7-9 May 1990:180 -187.
  • 8Denning D E. A lattice mode of secure information flow[J].Commu. ACM, May 1976,19(5).
  • 9Bell D E, La L J. Padula secure computer systems : mathematical foundations and model[Z]. M74-244, The MITRE Corporation, Bedford MA, October 1974.
  • 10Len Lapadula, secure computer systems: mathematical foundations[R]. MITRE Technical Report, Vol Ⅰ, 1996. titled Secure Computer Systems: Mathematical Foundations by Leonard J.LaPadula and D. Elliott Bell, dated 31 May 1973.

共引文献9

同被引文献27

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部