Paper Title:
Security Policy of Data in Enterprise Data Trusteeship Database
  Abstract

As the low maintenance cost of data trusteeship, more and more medium-size and small size enterprises choose data trusteeship service. Data is valuable fortune of enterprise, security of enterprise data must be guaranteed in the condition of together using a same host. Data security includes data transmission security, data storage security and confidentiality security. The paper discusses the security problem and coping strategy of database data in a data trusteeship environment. Two-phase sub-keys encryption algorithm is used to encrypt the data and also analysis its usability and security. The realized method is further presented. The algorithm solves the data security problem of database in a data trusteeship environment effectively and further enhances the security of database data.

  Info
Periodical
Edited by
Yanwen Wu
Pages
358-361
DOI
10.4028/www.scientific.net/AMR.187.358
Citation
H. Jiang, J. Wen, "Security Policy of Data in Enterprise Data Trusteeship Database", Advanced Materials Research, Vol. 187, pp. 358-361, 2011
Online since
February 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Guang Nian Yang, Wei Qi, Jun Zhou
Abstract:Now, our sewage treatment industry mainly depends on the blower of aeration act as metabolic, absorbed in the toxic substances. Blower...
591
Authors: Zong Hui Wang, Shu Su Shi, Li Cheng Yu, Wen Zhi Chen
Chapter 16: Geographic Information and Remote Sensing Science
Abstract:FCD-based traffic navigation system is getting more and more attention from countries all over the world. Shortest path algorithm is one of...
2880
Authors: Jia Liu, Yu Li Shen
Chapter 6: Communication and Network
Abstract:In this paper, a wireless local area network (WLAN) authentication scheme is proposed to both enhance the security and the working efficiency...
1113
Authors: Li Yan Jiang, Ya Ping Zhong, Qing Jian Wu
Chapter 5: Algorithm Design and Applications
Abstract:The sports injury is common in training, hindered the athletes to further improve the sports results. There are many factors in sports...
1545
Authors: Jun Tan
Chapter 12: Computer-Aided Design and Applications in Industry and Civil Engineering
Abstract:Online mining of frequent closed itemsets over streaming data is one of the most important issues in mining data streams. In this paper, we...
2910