2013 ◽  
Author(s):  
Fanxing Meng ◽  
Xiumei Wen ◽  
Liting Gao ◽  
Hui Pang ◽  
Qinglin Wang

2013 ◽  
Vol 380-384 ◽  
pp. 2306-2311
Author(s):  
Lin Na Huang

With the wide application of Web technology, Web database system is playing an increasingly important role in network application. The storage amount of Web database information is growing, at the same time, the security of Web database has been facing extremely daunting challenges. How to strengthen the security of Web database system has become an important issue of network researches. This paper has introduced implementation techniques of database security, described the sub-key encryption algorithm of database in details, and applied it to the management system of information student.


2012 ◽  
Vol 263-266 ◽  
pp. 3130-3134
Author(s):  
Hua Wang ◽  
Guo Hong Zhao ◽  
Bo Shan Shi ◽  
Xian Jun Meng

Based upon the resume of information system security, this paper sets forth security system of information system and the related system security technologies, such as network security technology, mainframe security technology, application security technology, database security technology, cipher security technology and environment security technology, and analyzes the security technology evolution of the information system.


2003 ◽  
Author(s):  
Jeffrey Worst ◽  
R. Jason Weiss
Keyword(s):  

Author(s):  
Lin Dai ◽  
Shiyong Jin ◽  
Longjun Song ◽  
Shouchen Sun

Sign in / Sign up

Export Citation Format

Share Document