Skip to main content
Top

2012 | OriginalPaper | Chapter

70. Research on Database Security Technology

Author : Fuguo Li

Published in: Electrical, Information Engineering and Mechatronics 2011

Publisher: Springer London

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid development of computer technology, database technology has been applied to a wide range of fields, thus the security of it has also become more and more important. The paper discusses the concept and safety system database security, the main risks facing database system, commonly used technology of database security, data security transmission protocol and the tendency of commonly used database security technology research.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Li S, Dai J, Zhang L (2009) The model of security enhancement for database based on rule self-study. Comput Appl Softw 26(1):110–111MathSciNet Li S, Dai J, Zhang L (2009) The model of security enhancement for database based on rule self-study. Comput Appl Softw 26(1):110–111MathSciNet
2.
go back to reference Bai K (2010) Analysis and process of application system database security issues. Electr Des Eng 18(7):91–93 Bai K (2010) Analysis and process of application system database security issues. Electr Des Eng 18(7):91–93
3.
go back to reference Chen J (2007) Research of security management for DDBS. Control Manag 23(15):154–156 Chen J (2007) Research of security management for DDBS. Control Manag 23(15):154–156
4.
go back to reference Hu S, Ye X, Peng Y, Xie F (2009) Design and development of a defense-in-depth model for database security. J Comput Res Dev 46(z2):99–104 Hu S, Ye X, Peng Y, Xie F (2009) Design and development of a defense-in-depth model for database security. J Comput Res Dev 46(z2):99–104
5.
go back to reference Xiu M, Feng X, Sun Z, Ruan H (2007) Network database security and application. Comput Knowl Technol 3(17):1272–1273 Xiu M, Feng X, Sun Z, Ruan H (2007) Network database security and application. Comput Knowl Technol 3(17):1272–1273
6.
go back to reference Zhang R, Liu C (2007) Research on web database security mode. J Beijing Union Univ Nat Sci 21(4):25–27 Zhang R, Liu C (2007) Research on web database security mode. J Beijing Union Univ Nat Sci 21(4):25–27
7.
go back to reference Yang T (2008) Study of database security and maintenance. Comput Knowl Technol 4(31):776–777 Yang T (2008) Study of database security and maintenance. Comput Knowl Technol 4(31):776–777
8.
go back to reference Zhou S (2010) Research on the network database and application. Comput Knowl Technol 6(5):1038–1040 Zhou S (2010) Research on the network database and application. Comput Knowl Technol 6(5):1038–1040
9.
go back to reference Gu Z, Du G (2007) Research on database security of SQL server application. Comput Eng Des 28(15):3717–3719 Gu Z, Du G (2007) Research on database security of SQL server application. Comput Eng Des 28(15):3717–3719
10.
go back to reference Lin J, Huang T, Yang C (2008) Realization of a database security auditing forensic model. Control Autom 24(27):132–134 Lin J, Huang T, Yang C (2008) Realization of a database security auditing forensic model. Control Autom 24(27):132–134
Metadata
Title
Research on Database Security Technology
Author
Fuguo Li
Copyright Year
2012
Publisher
Springer London
DOI
https://doi.org/10.1007/978-1-4471-2467-2_70