Research on network database encryption technology

At present, the security issue of large amount of computer data storage, sensitive defense data theft and tamper-proof issue has attracted people's attention increasingly. Database system as the core component of computer information system, database files as information aggregation, and their...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Yanhua Pan
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 693
container_issue
container_start_page 690
container_title
container_volume
creator Yanhua Pan
description At present, the security issue of large amount of computer data storage, sensitive defense data theft and tamper-proof issue has attracted people's attention increasingly. Database system as the core component of computer information system, database files as information aggregation, and their safety will be the top priority of the information industry. The core of information security is the database security, and database encryption security is one of the core questions of database security, compared with other safety means, in comprehensive consideration of safety degree, price, use maintenance costs, upgrade cost etc., the performance-price ratio of database encryption is the highest security means. This paper on database security, has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology.
doi_str_mv 10.1109/ICCSN.2011.6014819
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6014819</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6014819</ieee_id><sourcerecordid>6014819</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-69a2a15150d5be3bbbf0ab58d3aa068c21ca362aa3e47f705c6f667c30eaf4f53</originalsourceid><addsrcrecordid>eNo1j1FLwzAUhSMiqLN_QF_6B1rvTZo0eZSibjAUdO_jJr1x1dmOtCD99w6c5-XwceCDI8QtQokI7n7VNO8vpQTE0gBWFt2ZuEaD0laVNepcZK62_6z1pcjG8ROOMcY6qK-EfOORKYVdPvR5z9PPkL7ylibyNHLOfUjzYeqO28Rh1w_74WO-EReR9iNnp16IzdPjplkW69fnVfOwLjoHU2EcSUKNGlrtWXnvI5DXtlVEYGyQGEgZSaS4qmMNOphoTB0UMMUqarUQd3_ajpm3h9R9U5q3p5fqF5ZsRmc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Research on network database encryption technology</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yanhua Pan</creator><creatorcontrib>Yanhua Pan</creatorcontrib><description>At present, the security issue of large amount of computer data storage, sensitive defense data theft and tamper-proof issue has attracted people's attention increasingly. Database system as the core component of computer information system, database files as information aggregation, and their safety will be the top priority of the information industry. The core of information security is the database security, and database encryption security is one of the core questions of database security, compared with other safety means, in comprehensive consideration of safety degree, price, use maintenance costs, upgrade cost etc., the performance-price ratio of database encryption is the highest security means. This paper on database security, has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology.</description><identifier>ISBN: 9781612844855</identifier><identifier>ISBN: 1612844855</identifier><identifier>EISBN: 1612844863</identifier><identifier>EISBN: 1612844847</identifier><identifier>EISBN: 9781612844848</identifier><identifier>EISBN: 9781612844862</identifier><identifier>DOI: 10.1109/ICCSN.2011.6014819</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cipher Algorithm ; Cryptography ; Database Encryption ; Engines ; Fires ; Key ; Synchronization</subject><ispartof>2011 IEEE 3rd International Conference on Communication Software and Networks, 2011, p.690-693</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6014819$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6014819$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yanhua Pan</creatorcontrib><title>Research on network database encryption technology</title><title>2011 IEEE 3rd International Conference on Communication Software and Networks</title><addtitle>ICCSN</addtitle><description>At present, the security issue of large amount of computer data storage, sensitive defense data theft and tamper-proof issue has attracted people's attention increasingly. Database system as the core component of computer information system, database files as information aggregation, and their safety will be the top priority of the information industry. The core of information security is the database security, and database encryption security is one of the core questions of database security, compared with other safety means, in comprehensive consideration of safety degree, price, use maintenance costs, upgrade cost etc., the performance-price ratio of database encryption is the highest security means. This paper on database security, has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology.</description><subject>Cipher Algorithm</subject><subject>Cryptography</subject><subject>Database Encryption</subject><subject>Engines</subject><subject>Fires</subject><subject>Key</subject><subject>Synchronization</subject><isbn>9781612844855</isbn><isbn>1612844855</isbn><isbn>1612844863</isbn><isbn>1612844847</isbn><isbn>9781612844848</isbn><isbn>9781612844862</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1j1FLwzAUhSMiqLN_QF_6B1rvTZo0eZSibjAUdO_jJr1x1dmOtCD99w6c5-XwceCDI8QtQokI7n7VNO8vpQTE0gBWFt2ZuEaD0laVNepcZK62_6z1pcjG8ROOMcY6qK-EfOORKYVdPvR5z9PPkL7ylibyNHLOfUjzYeqO28Rh1w_74WO-EReR9iNnp16IzdPjplkW69fnVfOwLjoHU2EcSUKNGlrtWXnvI5DXtlVEYGyQGEgZSaS4qmMNOphoTB0UMMUqarUQd3_ajpm3h9R9U5q3p5fqF5ZsRmc</recordid><startdate>201105</startdate><enddate>201105</enddate><creator>Yanhua Pan</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201105</creationdate><title>Research on network database encryption technology</title><author>Yanhua Pan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-69a2a15150d5be3bbbf0ab58d3aa068c21ca362aa3e47f705c6f667c30eaf4f53</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Cipher Algorithm</topic><topic>Cryptography</topic><topic>Database Encryption</topic><topic>Engines</topic><topic>Fires</topic><topic>Key</topic><topic>Synchronization</topic><toplevel>online_resources</toplevel><creatorcontrib>Yanhua Pan</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yanhua Pan</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Research on network database encryption technology</atitle><btitle>2011 IEEE 3rd International Conference on Communication Software and Networks</btitle><stitle>ICCSN</stitle><date>2011-05</date><risdate>2011</risdate><spage>690</spage><epage>693</epage><pages>690-693</pages><isbn>9781612844855</isbn><isbn>1612844855</isbn><eisbn>1612844863</eisbn><eisbn>1612844847</eisbn><eisbn>9781612844848</eisbn><eisbn>9781612844862</eisbn><abstract>At present, the security issue of large amount of computer data storage, sensitive defense data theft and tamper-proof issue has attracted people's attention increasingly. Database system as the core component of computer information system, database files as information aggregation, and their safety will be the top priority of the information industry. The core of information security is the database security, and database encryption security is one of the core questions of database security, compared with other safety means, in comprehensive consideration of safety degree, price, use maintenance costs, upgrade cost etc., the performance-price ratio of database encryption is the highest security means. This paper on database security, has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology.</abstract><pub>IEEE</pub><doi>10.1109/ICCSN.2011.6014819</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781612844855
ispartof 2011 IEEE 3rd International Conference on Communication Software and Networks, 2011, p.690-693
issn
language eng
recordid cdi_ieee_primary_6014819
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Cipher Algorithm
Cryptography
Database Encryption
Engines
Fires
Key
Synchronization
title Research on network database encryption technology
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T14%3A39%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Research%20on%20network%20database%20encryption%20technology&rft.btitle=2011%20IEEE%203rd%20International%20Conference%20on%20Communication%20Software%20and%20Networks&rft.au=Yanhua%20Pan&rft.date=2011-05&rft.spage=690&rft.epage=693&rft.pages=690-693&rft.isbn=9781612844855&rft.isbn_list=1612844855&rft_id=info:doi/10.1109/ICCSN.2011.6014819&rft_dat=%3Cieee_6IE%3E6014819%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1612844863&rft.eisbn_list=1612844847&rft.eisbn_list=9781612844848&rft.eisbn_list=9781612844862&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6014819&rfr_iscdi=true