网络安全——网络数据库安全的定义 [3]
论文作者:www.51lunwen.org论文属性:作业 Assignment登出时间:2013-09-12编辑:yangcheng点击率:5315
论文字数:1421论文编号:org201309112129448332语种:英语 English地区:中国价格:免费论文
关键词:网络安全网络数据计算机安全
摘要:移动计算技术将会大大改变我们的工作和生活环境,给人类的生活带来便利,它代表着网络发展的一种必然趋势。我们可以随时随地运用互联网发布或收取数据信息,甚至是获取因为位置移动而不断改变的动态数据信息,如何保证移动计算环境下数据库的安全问题已经成为当前研究的热点问题。
e special views and stored procedures to restrict access to the contents of the database table . DBA and database systems can allow users with specific access privileges to grant access to other users.
Access control is mainly divided into discretionary access control and mandatory access control , role-based access control.
Discretionary Access Control (DAC) with access permission is subject , directly or indirectly, access to other body transfer , is one of the most common means of access control . Discretionary Access Control body can at will determine which users can access their resources, that the subject has the right to decide their own , a body can be selectively shared with other subjects of his resources. Discretionary Access Control One of the biggest problems is the principal's privileges is too large, it may inadvertently disclose information, but can not guard against Trojan horse attacks. In the mandatory access control (MAC) method, each data object is marked with a security classification , each user can be granted a level of a license . For any one object, and only those with legitimate users can access the license . Users can take advantage of discretionary access control to prevent other users on their own object of attacks , because the user can not directly change the mandatory access control attributes, mandatory access control provides an insurmountable , stronger security protection layer to prevent other users from accidental or intentional abuse of discretionary access control . Role-based access control (RBAC) is currently popular on the international advanced security access control method , and canceling it by assigning roles to complete the granting and revoking user permissions , and users based on their responsibilities and qualifications no longer be assigned to different roles . Thus, the entire access control process is divided into two parts, namely access is associated with the role , role and then associated with the user , enabling the user with access to the logic of separation , is now recognized to solve large-scale enterprise unified resource access control effective way .
2 ) User Identification and Authentication
Database system contains a large number of sensitive and confidential data , users must authenticate visiting . User identification and authentication [ 13 ] is a system to provide the most basic security measures . The method is provided by the system in a certain way so that users identify themselves by name or identity . Each user requirements into the system, be checked by the system , through the identification of the right to use machines have been provided after . Generally common user authentication methods are the following forms: password authentication ; digital certificate authentication ; smart card authentication and identification of personal characteristics . The four user authentication methods in all areas of life have different range of applications , authentication security is also different.
( 1 ) password authentication . This is a widely used authentication method . To ensure the security of the database , the user's password, and the password stored in encrypted form , and to periodically change the user 's password and password. Some systems store the password -way Hash value , even if the attacker is difficult to launch the ciphertext plaintext passwords .
( 2 ) digital certificates.
本论文由英语论文网提供整理,提供论文代写,英语论文代写,代写论文,代写英语论文,代写留学生论文,代写英文论文,留学生论文代写相关核心关键词搜索。