期刊文献+

Oracle数据库网络安全访问机制构建策略分析 被引量:4

Analysis on construction strategies of Oracle database network security access mechanism
下载PDF
导出
摘要 Oracle数据库作为一种全新的数据库形式,具有易操作、高效等优势,在实践中应用,能够为人们带来诸多便利。但由于处于开放的网络环境中,Oracle数据库在运行中面临着大量安全问题,给用户财产安全构成巨大威胁,且扰乱了网络环境,如何构建网络安全访问机制受到了广泛关注。文章从Oracle数据安全机制基本概念入手,对当前数据库面临的安全问题进行分析,并提出相应的网络安全访问机制构建策略。 Oracle database as a new database form with easy operation, high efficiency and other advantages, it can bring a lot of convenience for the people in practice. However, due to the open network environment, Oracle database is faced with a great deal of security problems in operation, which poses a great threat to the safety of users' property, and disrupts the network environment, how to construct the network security access mechanism has received extensive attention. This paper starts with the basic concept of Oracle data security mechanism, analyzes the security problems faced by the current database, and corresponding construction strategy of network security access mechanism is put forward.
作者 许戈
出处 《江苏科技信息》 2017年第29期39-40,共2页 Jiangsu Science and Technology Information
基金 项目名称:基于Oracle数据库的数据安全及恢复研究 项目编号:2017QNJJ13
关键词 ORACLE数据库 网络安全 访问机制 Oracle database network security access mechanism
  • 相关文献

参考文献5

二级参考文献23

  • 1祝远春.Oracle数据库网络安全研究[J].科技资讯,2008,6(28). 被引量:1
  • 2王海亮,林立新,焦大光,等.OraelelOg快速入门[M].北京:中国水利水电出版社,2007. 被引量:1
  • 3Kim S,Kim Dae-Kyoo, Kim S. A feature-based approach for modeling role- based access control systems [ J ]. Journal of Systems and Software,2011,84 ( 12 ) :2035-2052. 被引量:1
  • 4Richard D, Edward J, Timothy R. Adding Attributes to Role-based Access Control[J]. IEEE Computer,2010,43 (6) :79- 81. 被引量:1
  • 5ScienceDirect. Practical Oracle Security[ EB/OL]. 2012-07- 11. http ://www. sciencedirect, corn/science/. 被引量:1
  • 6DewsonR.SQLsenrer2005基础教程[M].北京:人民邮电出版社,2006. 被引量:1
  • 7England K, Powell G. Microsoft SQL Server 2005 Performance Optimization and Tuning Handbook [ M ]. [ s. I. ] : Digital Press, 2007. 被引量:1
  • 8源码天空.SQL用户自定义角色的创建[EB/OL].2012-07-11.http://www.codesky.net/article/201010/144597.ht-m1. 被引量:1
  • 9Martinez-Garcia C, Navarro-Arribas G, Borrell J. Fuzzy Role- based Access Control [ J ]. Information Processing Letters, 2011,111 ( 10 ) :483-487. 被引量:1
  • 10刘天华;孙阳;朱宏峰.网络安全[M]{H}北京:科学出版社,201004. 被引量:1

共引文献5

同被引文献25

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部