共查询到20条相似文献,搜索用时 875 毫秒
1.
Lotus Notes开发平台是一个面向非结构化信息领域优秀的通信处理软件和群件平台。本文将Notes数据库中存取控制安全机制和传统的关系数据库相结合,根据人员工作的调整自动改变人员在Notes系统中的相应权限,实现Notes存取控制安全机制的自维护 相似文献
2.
3.
4.
1引言
网络的普及让信息的获取、共享和传播更加方便,同时也增加了重要信息泄密的风险。电子文档的安全问题主要表现在明文存放、粗放权限控制、无限期文件权限、不可靠身份认证和无法追踪文件使用情况等方面。 相似文献
5.
宋涛 《太赫兹科学与电子信息学报》2008,6(3):226-229
在基于Lotus Domino的应用系统中,系统功能往往由多个Notes数据库组成,每个Notes数据库都有其自身的存取控制策略。在对系统进行维护时,比较传统和简单的方法是由系统管理员通过Designer或Administrator直接进行操作。然而这种方法的缺点是,必须安装专用工具,不支持基于浏览器的远程维护,且维护工作量也比较大。在基于B/S的应用中,把用户注册和权限管理等系统维护功能在Web页面上实现,能够增加系统的灵活性和可维护性,并且能够降低维护工作量。 相似文献
6.
基于XML的异构数据集成模式的研究 总被引:5,自引:1,他引:4
随着信息技术的发展,任何一个独立单位都有可能成为一个异构的数据源.为实现企业异构数据库问信息的共享和集成,对数据集成的原理以及主要技术进行了研究,重点分析了XML与数据库之间的映射、XML文档存储模式、将XML查询转化为SQL的查询转换问题以及如何将关系数据发布为XML文档,并提出了相应的解决方法.该方案简单易行,保证了各系统仍然按照原来的方式运行,只需要进行信息交换时通过转换接口把本地数据库数据转换成XML文档即可. 相似文献
7.
8.
9.
设计了融合ISO9000、ISO14000和OHSAS18000三种管理体系认证的认证管理系统,并采用基于角色授权的思想,对其权限控制方法进行改进与优化,通过读取用户在数据库中存储的授权信息,动态生成用户功能树的方法来实现权限管理,管理员可以通过模块授权、角色授权和功能点授权三种方法对用户授权,以供应用系统使用。 相似文献
10.
随着信息通信技术的发展,物联网的应用规模和多样性呈现出爆炸式增长,使用物联网设备的人员也越来越多,如何对不同的人员给设备设置相对应的权限也越来越复杂,过去简单的将每个人员的权限存在Mysql里这种方式的效率已经不适用于越来越庞大的物联网系统。文章提出了一种基于异构数据库的权限验证方法,该方法使用Redis数据库用于权限数据的缓存,使用Mysql数据库存储和管理各类人员的权限数据以及各类数据的属性数据。此方法可以提升不同人员在操作物联网设备时对权限验证的效率。 相似文献
11.
数据库存储了大量的数据和关键信息,保护数据库的安全性至关重要。优化与升级数据库访问信息的传输加密过程,可有效地加强信息传输过程的安全性及隐蔽性。在过去的一段时间里,有关部门应用的加密方法是借助信息传输加密函数的初始值与参数来获取数据库访问信息传输密钥序列,该方法虽然具有一定的加密效果,但并未关注到针对访问信息传输密钥的加密和解密运算,导致加密的精准度较差。文中主要分析了数据库访问信息传输加密及其优化措施,希望能为相关工作提供一定的意见和建议。 相似文献
12.
13.
SQL SERVER数据库安全监控系统的设计与实现 总被引:1,自引:0,他引:1
首先分析了SQL SERVER数据库系统存在的安全威胁,在介绍国内外数据库安全产品的基础之上,针对当前数据库安全产品存在的获取数据库信息种类单一以及在加密网络环境当中的应用受限等缺点,提出了新型的SQL SERVER数据库安全监控系统。该系统采用了全新的数据库信息获取技术,并结合模板定义和指令控制相结合的过滤方法以及改造的管道通信技术,保证了安全监控系统的高效运行,有效确保了数据库系统的安全。 相似文献
14.
Kundu A. Bertino E. 《IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews》2008,38(3):292-301
The paper proposes an approach to content dissemination that exploits the structural properties of an Extensible Markup Language (XML) document object model in order to provide an efficient dissemination and at the same time assuring content integrity and confidentiality. Our approach is based on the notion of encrypted postorder numbers that support the integrity and confidentiality requirements of XML content as well as facilitate efficient identification, extraction, and distribution of selected content portions. By using such notion, we develop a structure-based routing scheme that prevents information leaks in the XML data dissemination, and assures that content is delivered to users according to the access control policies, that is, policies specifying which users can receive which portions of the contents. Our proposed dissemination approach further enhances such structure-based, policy-based routing by combining it with multicast in order to achieve high efficiency in terms of bandwidth usage and speed of data delivery, thereby enhancing scalability. Our dissemination approach thus represents an efficient and secure mechanism for use in applications such as publish-subscribe systems for XML Documents. The publish-subscribe model restricts the consumer and document source information to the routers to which they register with. Our framework facilitates dissemination of contents with varying degrees of confidentiality and integrity requirements in a mix of trusted and untrusted networks, which is prevalent in current settings across enterprise networks and the Web. Also, it does not require the routers to be aware of any security policy in the sense that the routers do not need to implement any policy related to access control. 相似文献
15.
Using agents for secure access to data in the Internet 总被引:1,自引:0,他引:1
16.
基于互联网的绝大部分应用系统都会用到图片数据,应用系统中图片存储是关键技术。介绍一种基于SQL Server的Asp.net图片存储的实现方法,即把图片的路径、名称和注解等信息存储到数据库中,而真正的图片文件存储到硬盘的某个文件夹内,从而压缩数据库的信息量,提高数据库的访问性能。 相似文献
17.
刘莹 《信息技术与信息化》2012,(3):62-64
本文介绍了软件质量平台中关联规则挖掘的应用,利用关联规则挖掘的原理,将其运用到软件开发过程中,依据大量的客观数据来支持关联规律,提高规律的可信度。根据规模、配置申请、风险问题、错误缺陷、小组士气、任务进度六种属性来测量关联规则。 相似文献
18.
ADO.NET数据访问技术在电子档案管理系统中的应用 总被引:3,自引:0,他引:3
数据访问技术是Web数据库系统中最频繁的操作,是任何实际应用程序的核心部分。文中通过ADO.NET数据访问技术在电子档案管理系统中的应用实例,对使用ADO.NET数据访问技术来提高数据库访问的效率和性能进行了探讨。 相似文献
19.
Dongwon Jeong Hyejin Jeong Soo-Hyun Park Young-Sik Jeong Sangkyung Kim Changhwa Kim 《Wireless Personal Communications》2011,56(1):131-146
This paper proposes a novel security model for secure query processing in semantic sensor networks. A semantic sensor network
(SSN) is a sensor network including semantics of sensory data and context information, and relationships between the semantics
by using Semantic Web technologies. Even though much research has been activated on SSN, there is little activity on how to
securely access data in semantic sensor networks. Most of storages have been developed based on relational database model
and the relational database model provides a secure and robust security support. Therefore, we need to devise a security model
considering such a real environment. This paper proposes a new access control model for secure query processing in semantic
sensor networks. The proposed security model is based on relational database security model. This paper shows the overall
framework and definitions of the proposal, and the experiment and evaluation is described to show validity of our proposal.
With the experiment and evaluation, it is clear that the proposed model provides a secure access control support for SSNs. 相似文献
20.
The searching of an extensive document database for documents that are locally similar to a given query document, and the subsequent detection of similar regions between such documents, is considered as an essential task in the fields of information retrieval and data management. In this paper, we present a framework for such a task. The proposed framework employs the method of short‐read mapping, which is used in bioinformatics to reveal similarities between genomic sequences. In this paper, documents are considered biological objects; consequently, edit operations between locally similar documents are viewed as an evolutionary process. Accordingly, we are able to apply the method of evolution tracing in the detection of similar regions between documents. In addition, we propose heuristic methods to address issues associated with the different stages of the proposed framework, for example, a frequency‐based fragment ordering method and a locality‐aware interval aggregation method. Extensive experiments covering various scenarios related to the search of an extensive document database for documents that are locally similar to a given query document are considered, and the results indicate that the proposed framework outperforms existing methods. 相似文献