期刊文献+

生产线质量控制系统OLAP安全性的实现

Implementation of OLAP Security in Production Line Quality Control System
下载PDF
导出
摘要 针对某生产线质量控制系统的OLAP安全性研究,文中结合运用了用户身份认证、用户访问控制以及数据加密等多种安全性方案实现系统OLAP安全性。在OLAP系统安全性方案实现中具体体现为:首先,通过动态短信密码对访问用户进行身份验证;其次,对用户角色操作级别进行了详细分析,用户将根据角色级别对应权限登录相应的系统操作界面,用以避免推理威胁;最后,实现了对数据仓库中存储的企业敏感数据结合了结构化加密与分区加密方法,有效预防恶意用户从后台侵入盗取企业重要信息。在所有安全方案得以实现后,通过对采取了安全性方案前后的OLAP系统进行用户相同查询请求的响应时间开销进行直观数据对比,验证了该方案达到不影响系统性能且满足系统安全性的要求。 Aiming at the research of the OLAP safety of a production line quality control system, combined with a variety of security scheme, such as user identity authentication, user access control and data encryption, to realize the OLAP system safety. First of all, through dynamic message password for access to authenticate a user, the user will be the fight operation interface according to the charac- ter level, which will avoid the threats of inferences. At the same time, to encrypt the sensitive data by the combination of structured and partition encryption method will prevent the malicious users to steal important information from the background. Through the comparison of the response time consumption of before and after,the results show that this security scheme cannot influence the performance of sys- tem and meet the requirements of system security.
作者 漆媛 武彤
出处 《计算机技术与发展》 2015年第10期166-169,共4页 Computer Technology and Development
基金 贵州省工业攻关项目(黔科合GY字[2010]3061)
关键词 联机分析处理 安全性 权限控制 数据加密 OLAP security authority control data encryption
  • 相关文献

参考文献15

  • 1刘新平,蒋华,张敏,殷波.基于Analysis Services的OLAP安全性实现[J].桂林航天工业高等专科学校学报,2007,12(3):39-42. 被引量:2
  • 2蔡榆榕,陈维斌.OLAP安全访问的层次化设计与实现[J].华侨大学学报(自然科学版),2007,28(4):382-384. 被引量:2
  • 3GunderloyM.SQLServer开发指南-OLAP(联机分析处理)[M].张伟,译.北京:电子工业出版社,2001:45-53.
  • 4汤姆森.OLAP解决方案-创建多维信息系统[M].朱建秋,译.第2版.北京:电子工业出版社,2004:8-10.
  • 5杨荣明.动态短信密码验证功能系统解决方案[J].计算机光盘软件与应用,2013,16(4):28-28. 被引量:3
  • 6周海晴,陈启买,刘海.基于数据立方体的数据仓库安全控制[J].计算机工程,2010,36(10):152-154. 被引量:6
  • 7Kirkgoze R, Katic N, Stolba M, et al. A security concept for OLAP [ C ]//Proc of DEXA' 97. Toulouse, France : IEEE Com- puter Society, 1997.
  • 8Katic N, Quirchmayr J. A prototype model for data warehouse security based on metadata[ C ]//Proc of DEXA'98. Vienna, Austria : [ s. n. ] , 1998.
  • 9Weippl E, Mangisengi O, Essmayr W, et al. An authorization model for data warehouses and OLAP[ C ]//Proc of SRDS' 01. New Orleans,LA,USA:IEEE Computer Society,2001.
  • 10Rosenthal A, Sciore E. View security as the basis for data warehouse security [ C ]//Proc of DMDW ' 00. Stockholm, Sweden : [ s. n. ] ,2000.

二级参考文献42

  • 1唐贤伦,张学旺.OWC组件在Web图表统计中的应用[J].计算机应用,2003,23(z2):437-438. 被引量:13
  • 2吴溥峰,张玉清.数据库安全综述[J].计算机工程,2006,32(12):85-88. 被引量:96
  • 3梅伟恒,康晓东,江玉彬.基于数据仓库的OLAP技术的研究综述[J].中国科技信息,2006(14):134-135. 被引量:7
  • 4Kirkgoze R,Katic N,Stolba M,et al.A Security Concept for OLAP[C]//Proc.of DEXA'97.Toulouse,France:IEEE Computer Society,1997.
  • 5Katic N,Quirchmayr J,et al.A Prototype Model for Data Warehouse Security based on Metadata[C]//Proc.of DEXA'98.Vienna,Austria:[s.n.],1998.
  • 6Weippl E,Mangisengi O,Essmayr W,et al.An Authorization Model for Data Warehouses and OLAP[C]//Proc.of SRDS'01.New Orleans,LA,USA:IEEE Computer Society,2001.
  • 7Rosenthal A,Sciore E.View Security as the Basis for Data Warehouse Security[C]//Proc.of DMDW'00.Stockholm,Sweden:[s.n.],2000.
  • 8Wang Lingyu,Li Yingjiu.Precisely Answering Multidimensional Range Queries Without Privacy Breaches[C]//Proc.of ESORICS'03.Gjovik,Norway:[s.n.],2003.
  • 9Wang Lingyu,Wijesekera D,Jajodia S.Cardinality-based Inference Control in Data Cubes[J].Journal of Computer Security,2004,12(5):655-692.
  • 10Wang Lingyu,Jajodia S,Wijesekera D.Securing OLAP Data Cubes Against Privacy Breaches[C]//Proc.of the 2004 IEEE Symposium on Security and Privacy.Berkeley,CA,USA:IEEE Computer Society,2004.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部