DBST: A develop toolkit for database security

被引:0
|
作者
Liu, X [1 ]
Han, Z [1 ]
Shen, CX [1 ]
机构
[1] Naval Univ Engn, Wuhan, Peoples R China
关键词
database security; CASE; ER model;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Database system security is desired for acutely today But it is difficult and expensive to develop secure database system because it is difficult to design a consistent and complete database structure. To solve the problem we focus on the research results on both software engineering such as CASE technique and the security mechanisms. The secure database system development will be simplified greatly by combining database design methodology and information security technique to implement a develop toolkit for database security. So we made the effort to combine the security control mechanism (e.g. MAC) and database develop model-Entity Relation (ER) model to construct a Security Extended ER (SEER) model and design a toolkit named DBST based on the model. The security of the database system developed by DBST is analyzed. The research and applying of DBST puts forward a new ideal on secure database system development.
引用
收藏
页码:728 / 731
页数:4
相关论文
共 50 条
  • [41] Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
    Blake, Errol A.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2007, 2 (04) : 77 - 106
  • [42] HEALERS: A toolkit for enhancing the robustness and security of existing applications
    Fetzer, C
    Xiao, Z
    2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 317 - 322
  • [43] A security evaluation model and toolkit for enterprise information systems
    Yan, Q.
    FRONTIERS IN ENTERPRISE INTEGRATION, 2008, : 27 - 32
  • [44] Private partner to help develop equine database
    不详
    VETERINARY RECORD, 2004, 154 (26) : 805 - 805
  • [45] A Model-based Security Toolkit for the Internet of Things
    Neisse, Ricardo
    Fovino, Igor Nai
    Baldini, Gianmarco
    Stavroulaki, Vera
    Vlacheas, Panagiotis
    Giaffreda, Raffaele
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 78 - 87
  • [46] Cyber Security and Privacy Experiments: A Design and Reporting Toolkit
    Coopamootoo, Kovila P. L.
    Gross, Thomas
    PRIVACY AND IDENTITY MANAGEMENT: THE SMART REVOLUTION, 2018, 526 : 243 - 262
  • [47] How to develop and implement a usable training database
    LeVie, DS
    SOCIETY FOR TECHNICAL COMMUNICATION 44TH ANNUAL CONFERENCE, 1997 PROCEEDINGS, 1997, : 80 - 83
  • [48] An attempt to develop a database for epidemiological research in Semipalatinsk
    Katayama, Hiroaki
    Apsalikov, Kazbek N.
    Gusev, Boris I.
    Galich, Boris
    Madieva, Madina
    Koshpessova, GuIsum
    Abdikarimova, Asel
    Hoshi, Masaharu
    JOURNAL OF RADIATION RESEARCH, 2006, 47 (A189-A197) : A189 - A197
  • [49] THE IMAGE PROTECTOR A Flexible Security Rule Specification Toolkit
    Al Boum, Bechara
    Chbeir, Richard
    Gabillon, Alban
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 345 - 350
  • [50] Transaction security and database encryption
    不详
    AIRCRAFT ENGINEERING AND AEROSPACE TECHNOLOGY, 2003, 75 (03): : 301 - 303