DISTRIBUTED DATABASE-SECURITY

被引:1
|
作者
HARRIS, D
SIDWELL, D
机构
[1] Oracle Corporation UK, The Oracle Centre, Bracknell, Berkshire RG12 1BW, The Ring
关键词
D O I
10.1016/0167-4048(94)90003-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As critical information systems are increasingly moved from mainframe and proprietary platforms to open system environments, the management and implementation of security faces complex challenges. This article describes several of the security challenges raised by heterogeneous, distributed database environments; for example, distributed authentication services, encryption of network data and secure remote database administration. It then proposes how some of these challenges can be addressed by using current and forthcoming releases of Oracle server and networking products. It also briefly discusses the increased complexity of those challenges in a multilevel secure environment. This article focuses primarily on aspects of security which concern confidentiality (or privacy) of information rather than those which concern integrity (or correct maintenance of information) and availability (or proper accessibility to information and continuity of that service). However, measures which protect confidentiality, such as password control, often also help to protect against threats to integrity and availability.
引用
收藏
页码:547 / 557
页数:11
相关论文
共 50 条
  • [1] SDDM - A PROTOTYPE OF A DISTRIBUTED ARCHITECTURE FOR DATABASE-SECURITY
    JENSEN, CD
    KIEL, RM
    VERJINSKI, RD
    PROCEEDINGS : FIFTH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, 1989, : 356 - 364
  • [2] DATABASE-SECURITY
    DENNING, DE
    ANNUAL REVIEW OF COMPUTER SCIENCE, 1988, 3 : 1 - 22
  • [3] MEDICAL DATABASE-SECURITY EVALUATION
    PANGALOS, GJ
    MEDICAL INFORMATICS, 1993, 18 (04): : 283 - 292
  • [4] DATABASE-SECURITY - SYSTEM ARCHITECTURES
    HARTSON, HR
    INFORMATION SYSTEMS, 1981, 6 (01) : 1 - 22
  • [5] VIEWS FOR MULTILEVEL DATABASE-SECURITY
    DENNING, DE
    AKL, SG
    HECKMAN, M
    LUNT, TF
    MORGENSTERN, M
    NEUMANN, PG
    SCHELL, RR
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 129 - 140
  • [6] MEDICAL DATABASE-SECURITY POLICIES
    PANGALOS, GJ
    METHODS OF INFORMATION IN MEDICINE, 1993, 32 (05) : 349 - 356
  • [7] DATABASE-SECURITY - RESEARCH AND PRACTICE
    BERTINO, E
    JAJODIA, S
    SAMARATI, P
    INFORMATION SYSTEMS, 1995, 20 (07) : 537 - 556
  • [8] PERSPECTIVES ON DATABASE-SECURITY PANEL SUMMARY
    MORGENSTERN, M
    BISKUP, J
    DITTRICH, K
    LANDWEHR, C
    SCHAEFER, M
    DATABASE SECURITY, VIII: STATUS AND PROSPECTS, 1994, 60 : 377 - 390
  • [9] A MODIFIED RANDOM PERTURBATION METHOD FOR DATABASE-SECURITY
    TENDICK, P
    MATLOFF, N
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1994, 19 (01): : 47 - 63
  • [10] A 2-PHASE ENCRYPTION SCHEME FOR ENHANCING DATABASE-SECURITY
    HWANG, MS
    YANG, WP
    JOURNAL OF SYSTEMS AND SOFTWARE, 1995, 31 (03) : 257 - 265