摘要:计算机技术和无线通信技术的结合,产生了一种新的计算技术——移动计算(Mobile Computing)。在这种新的环境下,各种移动设备无需固定连接在某一个网络中,而是可以不受实际物理位置变化的影响,随时随地与其他移动客户端或固定网络相连接。利用移动计算这门新技术,可以将正确、有用、及时的信息与中央信息系统相互作用,减轻中央信息系统所承受的计算压力,使正确、有用、及时的信息能提供给在任何时间、地点需要它的任何用户。
on purposes.
Our universities and research institutions from the 1980s began the research and development of database technology , has achieved some research. Tsinghua University , Renmin University of China , Huazhong
Science and Technology University and other universities on database security technology research and practice , and the development of basic B1 level security requirements DM3 database software. In 2003, the Chinese Academy of Sciences State Key Laboratory of Information Security based on the open source database management system Postgre SQL, develop a secure database systems LOIS. Huazhong University to design a database encryption system that can achieve the initial effect of database encryption , encrypted tables, fields can be freely chosen by the user , can do the encryption process is transparent to the application , but there are some problems . For example , multi -level key encryption system management mode , the cryptographic mechanism is relatively complicated. And requires hardware support , affecting the system's ease of use. These studies are very meaningful , but also have made some very good results. However, generally speaking , our database products and foreign mainstream database products, security and usability there is a gap .
The early 1980s , in the United States began a database encryption technology. IBM's C.Wood, EBFerriandea, RCSummers published an article "Database Security: Requirement, Policies, and Models" and George I, Davida LW, John BK published "A Database Encryption System with Subkey" [1], marking the beginning of the study database encryption technology .
To better protect the mobile environment, database security , the paper made the following studies :
( 1 ) discuss the security of Web database system used by the related technologies.
( 2 ) Design and implementation of the entire Web database system model structure and complete the entire system analysis and summary.
( 3 ) focuses on discussion of the Web database encryption implementation.
The first chapter introduces the purpose and significance of this study . Mainly discusses the current research status .
The second chapter discusses the mobile computing environment Web database security issues, analysis of Web database facing security threats.
The third chapter introduces Web database encryption -related knowledge, analysis of the data encryption principles and algorithms.
Chapter IV presents the database encryption technology. First introduced the encryption method of choice , then introduces encryption prone to problems .
CHAPTER primarily designed for Web -based data encryption database system.
Chapter VI of this
thesis are summarized , and prospects for future work .
本论文由英语论文网提供整理,提供论文代写,英语论文代写,代写论文,代写英语论文,代写留学生论文,代写英文论文,留学生论文代写相关核心关键词搜索。