Research on network database encryption technology
At present, the security issue of large amount of computer data storage, sensitive defense data theft and tamper-proof issue has attracted people's attention increasingly. Database system as the core component of computer information system, database files as information aggregation, and their...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 693 |
---|---|
container_issue | |
container_start_page | 690 |
container_title | |
container_volume | |
creator | Yanhua Pan |
description | At present, the security issue of large amount of computer data storage, sensitive defense data theft and tamper-proof issue has attracted people's attention increasingly. Database system as the core component of computer information system, database files as information aggregation, and their safety will be the top priority of the information industry. The core of information security is the database security, and database encryption security is one of the core questions of database security, compared with other safety means, in comprehensive consideration of safety degree, price, use maintenance costs, upgrade cost etc., the performance-price ratio of database encryption is the highest security means. This paper on database security, has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology. |
doi_str_mv | 10.1109/ICCSN.2011.6014819 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6014819</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6014819</ieee_id><sourcerecordid>6014819</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-69a2a15150d5be3bbbf0ab58d3aa068c21ca362aa3e47f705c6f667c30eaf4f53</originalsourceid><addsrcrecordid>eNo1j1FLwzAUhSMiqLN_QF_6B1rvTZo0eZSibjAUdO_jJr1x1dmOtCD99w6c5-XwceCDI8QtQokI7n7VNO8vpQTE0gBWFt2ZuEaD0laVNepcZK62_6z1pcjG8ROOMcY6qK-EfOORKYVdPvR5z9PPkL7ylibyNHLOfUjzYeqO28Rh1w_74WO-EReR9iNnp16IzdPjplkW69fnVfOwLjoHU2EcSUKNGlrtWXnvI5DXtlVEYGyQGEgZSaS4qmMNOphoTB0UMMUqarUQd3_ajpm3h9R9U5q3p5fqF5ZsRmc</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Research on network database encryption technology</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yanhua Pan</creator><creatorcontrib>Yanhua Pan</creatorcontrib><description>At present, the security issue of large amount of computer data storage, sensitive defense data theft and tamper-proof issue has attracted people's attention increasingly. Database system as the core component of computer information system, database files as information aggregation, and their safety will be the top priority of the information industry. The core of information security is the database security, and database encryption security is one of the core questions of database security, compared with other safety means, in comprehensive consideration of safety degree, price, use maintenance costs, upgrade cost etc., the performance-price ratio of database encryption is the highest security means. This paper on database security, has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology.</description><identifier>ISBN: 9781612844855</identifier><identifier>ISBN: 1612844855</identifier><identifier>EISBN: 1612844863</identifier><identifier>EISBN: 1612844847</identifier><identifier>EISBN: 9781612844848</identifier><identifier>EISBN: 9781612844862</identifier><identifier>DOI: 10.1109/ICCSN.2011.6014819</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cipher Algorithm ; Cryptography ; Database Encryption ; Engines ; Fires ; Key ; Synchronization</subject><ispartof>2011 IEEE 3rd International Conference on Communication Software and Networks, 2011, p.690-693</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6014819$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6014819$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yanhua Pan</creatorcontrib><title>Research on network database encryption technology</title><title>2011 IEEE 3rd International Conference on Communication Software and Networks</title><addtitle>ICCSN</addtitle><description>At present, the security issue of large amount of computer data storage, sensitive defense data theft and tamper-proof issue has attracted people's attention increasingly. Database system as the core component of computer information system, database files as information aggregation, and their safety will be the top priority of the information industry. The core of information security is the database security, and database encryption security is one of the core questions of database security, compared with other safety means, in comprehensive consideration of safety degree, price, use maintenance costs, upgrade cost etc., the performance-price ratio of database encryption is the highest security means. This paper on database security, has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology.</description><subject>Cipher Algorithm</subject><subject>Cryptography</subject><subject>Database Encryption</subject><subject>Engines</subject><subject>Fires</subject><subject>Key</subject><subject>Synchronization</subject><isbn>9781612844855</isbn><isbn>1612844855</isbn><isbn>1612844863</isbn><isbn>1612844847</isbn><isbn>9781612844848</isbn><isbn>9781612844862</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1j1FLwzAUhSMiqLN_QF_6B1rvTZo0eZSibjAUdO_jJr1x1dmOtCD99w6c5-XwceCDI8QtQokI7n7VNO8vpQTE0gBWFt2ZuEaD0laVNepcZK62_6z1pcjG8ROOMcY6qK-EfOORKYVdPvR5z9PPkL7ylibyNHLOfUjzYeqO28Rh1w_74WO-EReR9iNnp16IzdPjplkW69fnVfOwLjoHU2EcSUKNGlrtWXnvI5DXtlVEYGyQGEgZSaS4qmMNOphoTB0UMMUqarUQd3_ajpm3h9R9U5q3p5fqF5ZsRmc</recordid><startdate>201105</startdate><enddate>201105</enddate><creator>Yanhua Pan</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201105</creationdate><title>Research on network database encryption technology</title><author>Yanhua Pan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-69a2a15150d5be3bbbf0ab58d3aa068c21ca362aa3e47f705c6f667c30eaf4f53</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Cipher Algorithm</topic><topic>Cryptography</topic><topic>Database Encryption</topic><topic>Engines</topic><topic>Fires</topic><topic>Key</topic><topic>Synchronization</topic><toplevel>online_resources</toplevel><creatorcontrib>Yanhua Pan</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yanhua Pan</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Research on network database encryption technology</atitle><btitle>2011 IEEE 3rd International Conference on Communication Software and Networks</btitle><stitle>ICCSN</stitle><date>2011-05</date><risdate>2011</risdate><spage>690</spage><epage>693</epage><pages>690-693</pages><isbn>9781612844855</isbn><isbn>1612844855</isbn><eisbn>1612844863</eisbn><eisbn>1612844847</eisbn><eisbn>9781612844848</eisbn><eisbn>9781612844862</eisbn><abstract>At present, the security issue of large amount of computer data storage, sensitive defense data theft and tamper-proof issue has attracted people's attention increasingly. Database system as the core component of computer information system, database files as information aggregation, and their safety will be the top priority of the information industry. The core of information security is the database security, and database encryption security is one of the core questions of database security, compared with other safety means, in comprehensive consideration of safety degree, price, use maintenance costs, upgrade cost etc., the performance-price ratio of database encryption is the highest security means. This paper on database security, has discussed the application of database file in database security strategy and the related encryption technology, encryption algorithm and encryption method and data encryption technology.</abstract><pub>IEEE</pub><doi>10.1109/ICCSN.2011.6014819</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781612844855 |
ispartof | 2011 IEEE 3rd International Conference on Communication Software and Networks, 2011, p.690-693 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6014819 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Cipher Algorithm Cryptography Database Encryption Engines Fires Key Synchronization |
title | Research on network database encryption technology |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T14%3A39%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Research%20on%20network%20database%20encryption%20technology&rft.btitle=2011%20IEEE%203rd%20International%20Conference%20on%20Communication%20Software%20and%20Networks&rft.au=Yanhua%20Pan&rft.date=2011-05&rft.spage=690&rft.epage=693&rft.pages=690-693&rft.isbn=9781612844855&rft.isbn_list=1612844855&rft_id=info:doi/10.1109/ICCSN.2011.6014819&rft_dat=%3Cieee_6IE%3E6014819%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1612844863&rft.eisbn_list=1612844847&rft.eisbn_list=9781612844848&rft.eisbn_list=9781612844862&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6014819&rfr_iscdi=true |