%0 Journal Article
%T Research on System Architecture of Secure Database Based on Immune Architecture
基于免疫体系的安全数据库结构设计研究
%A ZHONG Yong
%A QIN Xiao-Lin Information
%A Education Technology Center
%A Foshan University
%A Foshan Information Science
%A Technology Institute
%A Nanjing University of Aeronautics
%A Astronautics
%A Nanjing
%A
钟勇
%A 秦小麟
%J 计算机科学
%D 2005
%I
%X This paper presents a secure database based on immune architecture. The architecture has four tiers in- cluding identification and authentication layer, access control layer,constraints security layer and adaptive detection layer. The paper also discusses the structures of the sub layers of the constraints security layer and the adaptive de- tection layer. The constraints security layer consists of integrity constraints,classification and inference constraints, access constraints,and application semantics constraints. The adaptive detection layer consists of active database lev- el,relation schema level,transaction level and application semantics level. The paper outlines a multilayer and multi- level database security architecture. At the end of the paper,a detailed implementation is demonstrated.
%K Immune system
%K Database security
%K Database misuse
%K Misuse detection
安全层
%K 库结构
%K 四层结构
%K 数据库安全
%K 存取控制
%K 完整性约束
%K 事务
%K 安全数据
%K 免疫
%K 检测
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=3FA8060C2EB01A1D&yid=2DD7160C83D0ACED&vid=9971A5E270697F23&iid=0B39A22176CE99FB&sid=9CF7A0430CBB2DFD&eid=59906B3B2830C2C5&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=27