首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Building a highly available and intrusion tolerant database security and protection system ( DSPS)
作者姓名:Cai L  Yang XH  Dong JX
作者单位:InstituteofArtificialIntelligence,ZhejiangUniversity,Hangzhou310027,China)
摘    要:Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performane analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections ; and that proactive security is very useful and practical for large, critical applications.

关 键 词:数据库安全保护系统  数据库管理系统  前摄安全  入侵容忍  并发线路

Building a highly available and intrusion tolerant Database Security and Protection System (DSPS)
Cai L,Yang XH,Dong JX.Building a highly available and intrusion tolerant Database Security and Protection System (DSPS)[J].Journal of Zhejiang University Science,2003,4(3):287-293.
Authors:Cai Liang  Yang Xiao-Hu  Dong Jin-Xiang
Institution:Institute of Artificial Intelligence, Zhejiang University, Hangzhou 310027, China. cail2000@21cn.com
Abstract:Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
Keywords:
本文献已被 维普 PubMed 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号