Skip to main content

Research on Database Security Technology

  • Conference paper
  • First Online:
Electrical, Information Engineering and Mechatronics 2011

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 138))

  • 201 Accesses

Abstract

With the rapid development of computer technology, database technology has been applied to a wide range of fields, thus the security of it has also become more and more important. The paper discusses the concept and safety system database security, the main risks facing database system, commonly used technology of database security, data security transmission protocol and the tendency of commonly used database security technology research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 429.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li S, Dai J, Zhang L (2009) The model of security enhancement for database based on rule self-study. Comput Appl Softw 26(1):110–111

    MathSciNet  Google Scholar 

  2. Bai K (2010) Analysis and process of application system database security issues. Electr Des Eng 18(7):91–93

    Google Scholar 

  3. Chen J (2007) Research of security management for DDBS. Control Manag 23(15):154–156

    Google Scholar 

  4. Hu S, Ye X, Peng Y, Xie F (2009) Design and development of a defense-in-depth model for database security. J Comput Res Dev 46(z2):99–104

    Google Scholar 

  5. Xiu M, Feng X, Sun Z, Ruan H (2007) Network database security and application. Comput Knowl Technol 3(17):1272–1273

    Google Scholar 

  6. Zhang R, Liu C (2007) Research on web database security mode. J Beijing Union Univ Nat Sci 21(4):25–27

    Google Scholar 

  7. Yang T (2008) Study of database security and maintenance. Comput Knowl Technol 4(31):776–777

    Google Scholar 

  8. Zhou S (2010) Research on the network database and application. Comput Knowl Technol 6(5):1038–1040

    Google Scholar 

  9. Gu Z, Du G (2007) Research on database security of SQL server application. Comput Eng Des 28(15):3717–3719

    Google Scholar 

  10. Lin J, Huang T, Yang C (2008) Realization of a database security auditing forensic model. Control Autom 24(27):132–134

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fuguo Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag London Limited

About this paper

Cite this paper

Li, F. (2012). Research on Database Security Technology. In: Wang, X., Wang, F., Zhong, S. (eds) Electrical, Information Engineering and Mechatronics 2011. Lecture Notes in Electrical Engineering, vol 138. Springer, London. https://doi.org/10.1007/978-1-4471-2467-2_70

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-2467-2_70

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-2466-5

  • Online ISBN: 978-1-4471-2467-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics