Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (5): 40-42    DOI:
Current Issue | Archive | Adv Search |
Research on Security Mechanism of Network Database
Gan Lu1,Shao Han2
Xinyang Vocational and Technical College Xinyang Normal University
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  With the rapid development of computer technology and Internet technology, people gradually enter the modern era of information. Using a variety of modern means of information, people’s work and life become more convenient. But at the same time, there are criminals making the network security attacks. The security of network database is threatened, and the transmission and processing of information are affected, therefore a set of perfect security mechanism of network database needs to be developed to ensure the network database security. This article briefly introduces the basic concepts of network database security mechanism, network database model and its security mechanism model, analyzes the network database security mechanisms in each layer, and discusses on the use of DBMS security mechanism to prevent network attacks, so as to improve the network database safety and provide some suggestions.
Key wordsnetwork data storage      security mechanism      operating system     
Published: 10 November 2017
ZTFLH:  TP311.13  

Cite this article:

Gan Lu, Shao Han. Research on Security Mechanism of Network Database. Computer & Telecommunication, 2016, 1(5): 40-42.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I5/40

[1] WU Qing-gang ZHU Fu-bao HUANG Wei QIAN Shen-yi. Reform and Exploration of Operating System Curriculum Teaching for Computer System Ability Cultivation[J]. 电脑与电信, 2021, 1(9): 16-19.
[2] LI Sen-lin. Reform of Non-standardized Examination of Computer Operating System [J]. 电脑与电信, 2019, 1(4): 45-47.
[3] HuangWeiguo. Application of Micro Learning Resource in Linux Operating System Course[J]. 电脑与电信, 2017, 1(7): 82-83.
[4] Chen Shuangquan. Discussion on SQL Sever Database Security Mechanism[J]. 电脑与电信, 2016, 1(4): 57-58.
[5] Zhang Fenglai. Discussion on the Embedded Mobile Database Technology[J]. 电脑与电信, 2015, 1(8): 54-56.
[6] Chen Yongli, Chen Meijie, Zhang Guangming, Wang Dawei. Application of Time-axis Based on Method in Teaching Job Scheduling Algorithms of Operating System[J]. 电脑与电信, 2015, 1(12): 52-54.
[7] Wu Wenqing. Solution of Windows Server 2003 Auto Logout after Cloning[J]. , 2011, 1(10): 0-0.
[8] Li Liang. The Methods of Installing Operating System in the Computer Laboratory of University[J]. , 2011, 1(06): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd