计算机应用

• 数据库技术(特约专题)(Database technology • 上一篇    下一篇

可信数据库—概念、发展和挑战

彭智勇 杨鏖丞 任毅   

  1. 武汉大学软件工程国家重点实验室;武汉大学计算中心
  • 收稿日期:2008-07-10 修回日期:2008-08-06 出版日期:2008-11-01 发布日期:2008-11-01
  • 通讯作者: 杨鏖丞

Trusted database-concepts, development and challenge

<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>Z<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>h<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>i<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>-<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>y<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>o<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>n<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>g<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>P<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>E<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>N<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>G<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>A<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>o<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>-<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>c<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>h<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>e<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>n<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>g<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>Y<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>A<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>N<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>G<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>Y<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>i<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>R<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>E<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>N<a href="http://manu33.magtech.com.cn/Jwk3_jsjyy/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>   

  • Received:2008-07-10 Revised:2008-08-06 Online:2008-11-01 Published:2008-11-01
  • Contact: Ao-cheng YANG

摘要: 数据库的可信性正受到越来越多的关注。综述了国内外研究成果,提出了可信数据库的基本概念。对保证数据库可信性的访问控制、密文查询、隐私保护机制的研究现状和研究成果进行了总结,分析了现有研究成果中存在的一些问题,提出了可信数据库研究中存在的一些难点问题。

关键词: 可信数据库, 访问控制, 密文查询, 隐私保护

Abstract: The database trust has been paid more and more attention. Based on the domestic and international research results, the concept of the trusted database was proposed in this paper. The mechanisms used to ensure the database trust are surveyed. They include the access control mechanism, encrypted data query mechanism and privacy protection mechanism. The limitations of the existing mechanisms were analyzed and some difficult problems that existed in the research of the trusted database were discussed as well.

Key words: trusted database, access control, encrypted data query, privacy protection