The research of network database security technology based on web service

2013 ◽  
Author(s):  
Fanxing Meng ◽  
Xiumei Wen ◽  
Liting Gao ◽  
Hui Pang ◽  
Qinglin Wang
2014 ◽  
Vol 539 ◽  
pp. 313-316
Author(s):  
Wei Jiang Geng

This paper analyzes the functional design and structure design of the database security model networks, research and further realizes the key features of the model. The system is suitable for network security database management system, which has a certain universality and portability.


2014 ◽  
Vol 608-609 ◽  
pp. 331-335
Author(s):  
Fu Mei Liu ◽  
Wen Liang Qu

Database is the core part of university digital campus platform. Database encryption is an effective method to guarantee the security of data. The paper analyze the structure design of database security model, and study the design of mode function, key features and further implementation model. The system is suitable for security protection for network database management, and has a certain degree of universality, portability and security.


2013 ◽  
Vol 380-384 ◽  
pp. 2306-2311
Author(s):  
Lin Na Huang

With the wide application of Web technology, Web database system is playing an increasingly important role in network application. The storage amount of Web database information is growing, at the same time, the security of Web database has been facing extremely daunting challenges. How to strengthen the security of Web database system has become an important issue of network researches. This paper has introduced implementation techniques of database security, described the sub-key encryption algorithm of database in details, and applied it to the management system of information student.


2012 ◽  
Vol 263-266 ◽  
pp. 3130-3134
Author(s):  
Hua Wang ◽  
Guo Hong Zhao ◽  
Bo Shan Shi ◽  
Xian Jun Meng

Based upon the resume of information system security, this paper sets forth security system of information system and the related system security technologies, such as network security technology, mainframe security technology, application security technology, database security technology, cipher security technology and environment security technology, and analyzes the security technology evolution of the information system.


Sign in / Sign up

Export Citation Format

Share Document