DBST: A develop toolkit for database security

被引:0
|
作者
Liu, X [1 ]
Han, Z [1 ]
Shen, CX [1 ]
机构
[1] Naval Univ Engn, Wuhan, Peoples R China
关键词
database security; CASE; ER model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Database system security is desired for acutely today But it is difficult and expensive to develop secure database system because it is difficult to design a consistent and complete database structure. To solve the problem we focus on the research results on both software engineering such as CASE technique and the security mechanisms. The secure database system development will be simplified greatly by combining database design methodology and information security technique to implement a develop toolkit for database security. So we made the effort to combine the security control mechanism (e.g. MAC) and database develop model-Entity Relation (ER) model to construct a Security Extended ER (SEER) model and design a toolkit named DBST based on the model. The security of the database system developed by DBST is analyzed. The research and applying of DBST puts forward a new ideal on secure database system development.
引用
收藏
页码:728 / 731
页数:4
相关论文
共 50 条
  • [31] Database centralizes security
    不详
    CONTROL ENGINEERING, 2007, 54 (06) : 10 - 10
  • [32] Overview of database security
    Wu, Pufeng
    Zhang, Yuqing
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (12): : 85 - 88
  • [33] Database security for the web
    Maheshwari, Anil K.
    Information Systems Management, 16 (02): : 85 - 88
  • [34] Deductive database security
    Barker, S
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 103 - 114
  • [35] Importance of Security in Database
    Pourzargham, Hamed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (05): : 29 - 31
  • [36] Database security: An overview
    Salehnia, A
    INNOVATIONS THROUGH INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2004, : 467 - 470
  • [37] Database security and privacy
    Jajodia, S
    ACM COMPUTING SURVEYS, 1996, 28 (01) : 129 - 131
  • [38] Toolkit of automated database creation and cross-match
    Zhang, Yanxia
    Zheng, Hongwen
    Pei, Tong
    Zhao, Yongheng
    SOFTWARE AND CYBERINFRASTRUCTURE FOR ASTRONOMY II, 2012, 8451
  • [39] How to Develop Cloud Security Awareness
    Ruboczki, Edit Szilvia
    2015 IEEE 10TH JUBILEE INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2015, : 323 - 326
  • [40] NEW SECURITY CONCEPT EXPECTED TO DEVELOP
    KUSUMI, E
    BUSINESS JAPAN, 1976, 21 (07): : 64 - 66