会议专题

Real-time Security Monitoring Based on the ORACLE Database Security Model

As the application of Database becomes more and more popular, the security of the data attracts more eyes on it.This paper depicts Audit, Logminer and Trigger of Database,and analyzes the advantages and disadvantages of these three technologies used to supervise the DML to database. Whats more, this paper brings forward a practical scheme according to the instance. Together with the technology of Access Control,redundant backup recovery and network security, it makes an all-round security system.

Database Security Trigger Logminer Audit

ZHANG Fange

School of Computer Science and Technology North China Electric Power University Hebei, Baoding 071003, China

国际会议

第一届国际计算机新科技与教育学术会议(Proceedings of the First International Conference on Computer Science & Education ICCSE2006)

厦门

英文

235-238

2006-07-27(万方平台首次上网日期,不代表论文的发表时间)