Embedded Network Database Encryption System Optimization Considering the B/S Structure and Software Optimization

被引:0
作者
Ma, Qinmin [1 ]
机构
[1] Shenzhen Polytech, Sch Artificial Intelligence, Shenzhen 518055, Guangdong, Peoples R China
来源
PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021) | 2021年
关键词
Embedded Network Database; Database Encryption; BS Structure; Embedded Design;
D O I
10.1109/I-SMAC52330.2021.9640735
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of computer network technology, more and more units and individuals share abundant data resources, and information security has become the primary problem to be solved by network information systems. The database management system comes with a basic security technology strategy, which can solve common database security requirements. However, for some special data security applications, the security technology strategy of the database itself cannot meet the requirements, which requires data encryption. Processing data encryption is the core content of information security research, and database encryption is an important means to improve database security. This paper studies the design of embedded network database system based on BS structure.
引用
收藏
页码:1563 / 1566
页数:4
相关论文
共 24 条
  • [11] Li Shuzhen, 2002, COMPUTER APPL, V22, P51
  • [12] Lu Kaicheng, 2003, COMPUTER CRYPTOGRAPH, P2
  • [13] Mi Yulin, 2005, COMPUTER ENG, V31, P132
  • [14] Oracle and/or its affiliates, 2008, MY SQL 5 5 REF MAN, P15
  • [15] Sun Pingping, 2009, COMPUTER MODERNIZATI, V11, P6
  • [16] Wang Guohui, 2006, JSP DATABASE SYSTEM, P5
  • [17] Wu Pufeng, 2006, COMPUTER ENG, V12, P85
  • [18] Xie Yunjia, 2006, MICROCOMPUTER INFORM
  • [19] Ye Zhen, 2007, COMPUTER TECHNOLOGY, V2, P220
  • [20] Zhang Xiao-min, 2005, JAVA REALIZAT ION CR, P31