In this paper a new scheme of key management is provided,two—level key transformation,which is considerably secure and easy to be implemented.Based on this scheme,a DBEMT(database encryption management tool)is achieved.The overall de-signs and functions of DBEMT are presented in detail.according to various ways for secu-rity class division,the designs of cipher databases using field classification,record classifi-cation and attribute classification methods are discussed respectively.Compared with conventional schemes,it has properties of good operability and high running speed.This scheme offers good prospect for utilization.
1 费杭柏.数据库安全与加密.密码与信息,1991,(1):46~51.
2 Teresa F Lunt,Deborah M Cooper.Introduction:security and privacy.IEEE Transactions on Software Engineering,1991,17(11):1145~1146.
3 Denning D E. Cryptography and data security. Massachusetts:Addison—Wesley, 1982.
4 陈卫. 数据库加密密钥的分配与管理技术. 清华大学学报,1994,34(1);99~104.
5 戴一奇等.一种新的数据库加密管理方案. 清华大学学报,1995,35(4).
6 Hardjono T. Record encryption in distributed databases.Advances in Cryptography—AUSCRYPT’90, Springer-Verlag, 1990, 386~397.
7 Fernandez E B,Summer R C, Wood C.Database security and integrity.Massachusetts: Addison—Wesley,1981.
8 Dorthy E Denning, Sdim G Akl,Matthew Morgenstern. Views for multilevel database security. IEEE Transactions on Software Engineering,1987,13(2):129~140.
You are the first2045336Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.