By Topic

The structure design of database security monitoring system based on IDS

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Zhang Xing ; Dept. of Comput. Sci. & Eng. of, Henan Univ. of Urban Constr., Pingdingshan, China ; Hao Wei

Database as enterprise data information aggregation is a core component of enterprise information storage, its security is essential. Database security should not only concern the protection of sensitive data, but also study new mechanisms to ensure that users in a manner to be bound can find the needed information, that is, to research the database security under the premise of ensuring the availability. This paper describes an IDS-based database security model, including its specific application in practice and how to achieve intrusion tolerance in the new security model.

Published in:

Computer Engineering and Technology (ICCET), 2010 2nd International Conference on  (Volume:3 )

Date of Conference:

16-18 April 2010