Research on Security and Privacy Protection of Database

Article Preview

Abstract:

As the wide application of computer and information sharing, database security and privacy of data become a research hotspot. First this paper analyzes the security threats the database face, from internal personnel errors, configuration, social engineering, and not patched vulnerabilities four aspects. And then it expounds database system security technologies that are database authentication, access control and audit. Finally, this paper introduces the privacy protection of the database. It hopes to provide the certain reference significance in improving the database security and privacy protection technology.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

5873-5876

Citation:

Online since:

May 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Qingpu Wang. Research on the database security based on information technology [J]. Journal of Nanchang College, 2011: 170-172.

Google Scholar

[2] Anzhong Sun. Discuss about the security of network database management and maintenance policy [J]. Technology Wind, 2008: 12-14.

Google Scholar

[3] Linrui Li. Research on the database security management [J]. Manufacturing Automation, 2012: 23-25.

Google Scholar

[4] Zu Xiao. Research on the security of network database management [J]. Computer CD software and application , 2012 : 8-11.

Google Scholar

[5] Pufeng Wu, Yuqing Zhang. Review of the datebase security [J]. Computer engineering, 2006: 34-37.

Google Scholar

[6] Ping Qian,Meng Wu. Review of internet privacy research and method [J]. Application Research of Computer, 2013: 13-20.

Google Scholar