Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Jiangxi Normal University (Natural Sciences Edition)》 2005-04
Add to Favorite Get Latest Update

Research on Database Security Middleware(DBSAPI)

WU Shui-xiu~1, ZENG Qing-peng~2(1.College of Computer and Information Engineering, Jiangxi Normal University,Nanchang 330027, China;2.School of Information Engineering,Nanchang University,Nanchang 330047, China)  
An approach of Database encryption include users authentication, access control information encryption and safe transmission are discussed in this paper.A uniform solution based on middleware is given.the middleware has been successfully used in a practical Database system to encrypt the Database important or sensitive information.
【Fund】: 国家教育部科学技术研究项目(03070).
【CateGory Index】: TP311.2
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 3 Hits
1 Cui Guohua Hong Fan Fu Xiaoqin Hu Lunjun;More Secure Encryption Mechanism in Database System[J];JOURNAL OF HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGY;2000-07
2 PENG Pai, DAI Yiqi, LI Wujun(Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China);Design of network encrypted database system[J];Journal of Tsinghua University(Science and Technology);2001-01
3 YANG Li ping 1 WANG Xiao lei 2 LI Tong 1 LI Li 1 1 (Shenyang Institue of Computing Technology,Chinese Academy of Sciences Liaoning Shenyang 110004,China) 2 (Fudan University Shanghai 200433);DB MIDDLEWARE TECHNOLOGY AND ITS APPLICATION BASED ON THREE-TIER CLIENT/SERVER MODEL[J];Mini-micro Systems;2001-04
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 XU Liang feng1, CUI Xiang dong2(1. Sch. of Comp. Sci. & Info. Engn., Hefei University of Technology, Hefei 230009, China; 2. Anhui Telecomunication Institute of Plan and Design, Hefei 230022, China);The three tier structure and its application in database system[J];Journal of Anhui Institute of Mechanical and Electrical Engineering;2002-03
2 ZHOU Wen1,LIANG Xiang-jun2,SHUAI Bin1(1.Dept.of Comp.& Engn.,Anhui University of Technology and Science,Wuhu 241000,China;2.Anhui Bureau of Eduation,Hefei 230061,China);A new database outward encrypting research based in RSA[J];Journal of Anhui University of Technology and Science(Natural Science);2008-03
3 WU Jiaqi(State Grid Electric Power Research Institute,Nanjing 210003,China);Design and Realization of Database Middleware in Automatic Hydrological Systems[J];Hydropower Automation and Dam Monitoring;2009-04
4 Chu Zhikai Lv Xiuping Lu Xiaoya;Research and Implementation of SQL Server Database Encryption Technology[J];Computer Study;2010-01
5 Li Shuwen et al;Implementation of Server Database Access Middleware based on Web Service[J];Computer Development & Applications;2010-02
6 MENG Kai,YAN Hong-yin(School of Computer Science and Technology,Taiyuan University of Technology,Taiyuan 030024,China);Quick Query of the Encrypted Database[J];Computer Development & Applications;2012-04
7 ZHANG Yan,CHEN Zhigang;An application and research of three-tier C/S architecture combined with Datasnap technology[J];Computer and Information Technology;2004-06
8 WEI Li-na1,CHEN Fei2,MO Shao-hui3 (1.Guangxi University for Nationalities,Nanning 530006,China;2.Guangdong Province Shenzhen City Luohu District People's Procuratorate,Shenzhen 518003,China;3.Guangxi NanYa(Focus) Net Technology College,Nanning 530021,China);Research and Realize on the Exploitation Frame of Secure Electronic Government Affair System[J];Computer and Information Technology;2012-03
9 WU Rong-zhen(Fujian vocational college of agriculture Information technology department fuzhou 350003 p.r.china);Realizes the network memory security strategy and the contrastive analysis[J];Computer Security;2008-10
10 GUO Li-gang,YHO Han-bing(School of Computer Science and Technology,Wuhan University of Technology,Wuhan,Hubei 430063,China);Research on Encrypted Database Search Method based on Inverted Index[J];Computer Security;2010-09
China Proceedings of conference Full-text Database 3 Hits
1 Wang Jian Yin Lixin (School of Information Science and Engineering,ShanDong University,Jinan 250100);Design and Implementation of Online Marking Based on VC ++[A];[C];2010
2 ZHANG Chengjun,HUANG Hongmei,WANG Xiaobo 1.Unit 91635 of the PLA,China 2.Unit 91746 of the PLA,China;Constructing new type distributed database middleware[A];[C];2011
3 Ma Sha~(1,3),Yu Lei~2,and Peng Zhiyong~1 1(State Key Laboratory of Software Engineering,Wuhan University,Wuhan 430072) 2(School of Computer Science,Wuhan University,Wuhan 430072) 3(South China Agricultural University,Guangzhou 510642);A Database Encryption Scheme Based on Database-As-Service Model[A];[C];2006
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 WANG Jin, LIU Zi-wei, HUANG Xiao-fang (College of Computer Science, Southwest University of Science & Technology, Mianyang 621002, China);Encryption Arithmetic and Key Technology in Database Encryption[J];Ordnance Industry Automation;2004-06
2 WANG Jin, LIU Zi-wei, HUANG Xiao-fang (College of Computer Science, Southwest University of Science & Technology, Mianyang 621002, China);Application on Key Management in Database Encryption[J];Ordnance Industry Automation;2005-01
3 ZHU Qin~(1,2),LUO Yi-shu~2,LE Jia-jin~2 (1.College of Computer Science and Technology,Nantong University,Nantong Jiangsu 226019,China; 2.College of Computer Science and Technology,Donghua University,Shanghai 201620,China);A Survey on Techniques of Database Encryption and Query over Encrypted Data[J];Journal of Donghua University(Natural Science);2007-04
4 FENG Chao-sheng1,2,QIN Zhi-guang1,YUAN Ding1 (1. School of Computer Science & Engineering, University of Electronic Science and Technology of China Chengdu 610054;2. School of Computer Science, Sichuan Normal University Chengdu 610066);Design of Key-Managing Module of Database Encryption System[J];Journal of University of Electronic Science and Technology of China;2007-05
5 ;Contentbased Multi-level Secure Database Encipher Mechanism[J];Journal of Ezhou University;1999-03
6 LUO Zu-ling(Guangxi Technological College of Machinery and Electricity,Nanning 530007,China);Encryption Technology of Database Based on DES[J];Equipment Manufacturing Technology;2007-06
7 Cui Guohua Hong Fan Fu Xiaoqin Hu Lunjun;More Secure Encryption Mechanism in Database System[J];JOURNAL OF HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGY;2000-07
8 Yu Xiangxuan Liu Wei College of Computer Sci. & Tech., Huazhong Univ. of Sci. & Tech., Wuhan 430074, China;Ciphertext index mechanism for database system[J];Journal of Huazhong University of Science and Technology;2002-03
9 Yu Xiangxuan Cui Yongquan Cui Guohua College of Computer Sci. & Tech., Huazhong Univ. of Sci. & Tech., Wuhan 430074, China.;Key management for database encryption in distributed environment[J];Journal of Huazhong University of Science and Technology;2002-04
10 Chen Tieying Chen Hua Liu YuChen Tieying Prof., Dept. of Control Sci. & Eng., Huazhong Univ. of Sci. & Tech., Wuhan 430074, (China).;Three-layer application system for database encryption[J];Journal of Huazhong University of Science and Technology;2005-07
【Secondary References】
Chinese Journal Full-text Database 1 Hits
1 QIN Xiao- xia, LI Wen- hua, LUO Jian- fen (College of Computer Science, Yangtze University, Jingzhou 434023, China);Discuss About Database Encryption Technology[J];Computer Knowledge and Technology;2008-18
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 Dai Yiqi; Shang Jie; Chen Wei; Su Zhongmin(Department of Computer Science and Technology, Tsinghua University);New key management scheme in database encryption[J];;1995-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved