{"title":"基于跳变机制的数据库安全模型的设计与实现","authors":"Zhan Cui, Jianping Zeng, Chengrong Wu, Shiyong Zhang","doi":"10.1109/ICASID.2015.7405649","DOIUrl":null,"url":null,"abstract":"Database security is an important part of information security. With the background of login verification, this paper proposes a database security model based on hopping mechanism and gives theoretical analysis to it. In the theoretical analysis, we gives the specific expression of the probability of successful attack and theoretical deducation of the expression. Finally, we establish the prototype of the model and carry out an experiment to validate it. The final experiment shows that the result accords with the theoretical analysis and the model we established has a high efficiency in the database security and can offer a new direction for the database security research.","PeriodicalId":403184,"journal":{"name":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Design and implementation of a new database security model based on hopping mechanism\",\"authors\":\"Zhan Cui, Jianping Zeng, Chengrong Wu, Shiyong Zhang\",\"doi\":\"10.1109/ICASID.2015.7405649\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Database security is an important part of information security. With the background of login verification, this paper proposes a database security model based on hopping mechanism and gives theoretical analysis to it. In the theoretical analysis, we gives the specific expression of the probability of successful attack and theoretical deducation of the expression. Finally, we establish the prototype of the model and carry out an experiment to validate it. The final experiment shows that the result accords with the theoretical analysis and the model we established has a high efficiency in the database security and can offer a new direction for the database security research.\",\"PeriodicalId\":403184,\"journal\":{\"name\":\"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICASID.2015.7405649\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 9th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICASID.2015.7405649","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design and implementation of a new database security model based on hopping mechanism
Database security is an important part of information security. With the background of login verification, this paper proposes a database security model based on hopping mechanism and gives theoretical analysis to it. In the theoretical analysis, we gives the specific expression of the probability of successful attack and theoretical deducation of the expression. Finally, we establish the prototype of the model and carry out an experiment to validate it. The final experiment shows that the result accords with the theoretical analysis and the model we established has a high efficiency in the database security and can offer a new direction for the database security research.