The Application of VPD in University Entrance Examination Management System

Full Text (PDF, 129KB), PP.28-32

Views: 0 Downloads: 0

Author(s)

Wang Guan 1,* Yan Rui 1

1. Computer Institute Beijing University of Technology Beijing, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijem.2011.02.05

Received: 18 Nov. 2010 / Revised: 7 Jan. 2011 / Accepted: 9 Feb. 2011 / Published: 8 Apr. 2011

Index Terms

Grained access control, database, virtual private database, security policy, row-level security

Abstract

Virtual Private Database (VPD) ensures the privacy of information and prevents direct data leakage through computer terminals by providing Fine-grained Access Control (FGAC). This paper firstly introduces the security requirements of the test database management system and based on which, further analyzes the existing shortcomings in access control technology. Through a brief introduction of VPD, the security design of the test database management system is then described, in which both the security and flexibility of the system are increased and the information leaks and other security related problems of the system are solved.

Cite This Paper

Wang Guan, Yan Rui,"The Application of VPD in University Entrance Examination Management System", IJEM, vol.1, no.2, pp.28-32, 2011. DOI: 10.5815/ijem.2011.02.05

Reference

[1] Jingmin He, Min Wang. Cryptography and Relational Database Management System, Interactive Dialogue with Educator from Across State, 2001, pp.273–284. (in Chinese)
[2] R.Agrawal and J.Kiernan, Watermarking Relational Databases, In the proceedings of the International Conference on Very Lgare Databases, 2002, pp.155–166.
[3] Cheng-rong Wu and Shi-yong Zhang, Database Access Control Models, Computer Engineering and Applications, 2002, pp.169–185. (in Chinese)
[4] Rizvi R, Mendelzon A and Sudarshan S, Extending Query Rewriting Techniques for Fine-Grained Access Control, 2004, pp.13–18.
[5] U Maheshwari, R Vingralek amd W Shapiro, How to build a Trusted Database System on Untrusted Storage. In the proceedings of Operating System Design and Implementation, 2000, pp.135–150.
[6] Denning D. E. Field Encryption and authentication. Chaum Ded.Advancds in Cryptology. Proceedings of Crypto’s 83.Unvi.Of California.Santa Barbare.CA.1983. Plenum Press. 1984, pp.231–247.
[7] The Virtual Private Database in Oracle9i. An Oracle Technical White Paper. http://otn.oracle.com/deploy/security/oracle9ir2/pdf/vpd9ir2twp.pdf.