Real-time Security Monitoring Based on the ORACLE Database Security Model
As the application of Database becomes more and more popular, the security of the data attracts more eyes on it.This paper depicts Audit, Logminer and Trigger of Database,and analyzes the advantages and disadvantages of these three technologies used to supervise the DML to database. Whats more, this paper brings forward a practical scheme according to the instance. Together with the technology of Access Control,redundant backup recovery and network security, it makes an all-round security system.
Database Security Trigger Logminer Audit
ZHANG Fange
School of Computer Science and Technology North China Electric Power University Hebei, Baoding 071003, China
国际会议
厦门
英文
235-238
2006-07-27(万方平台首次上网日期,不代表论文的发表时间)