| 1 | BERTINO E, SANDHU R. Database security-concepts, approaches, and challenges [J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2(1): 2-19. | 
																													
																						| 2 | SQLite home page [EB/OL]. [2023-01-31]. . | 
																													
																						| 3 | BHOSALE S T, PATIL T, PATIL P. SQLite: light database system[J]. International Journal of Computer Science and Mobile Computing, 2015, 44(4): 882-885. | 
																													
																						| 4 | YUE K, JIANG L, YANG L, et al. Research of embedded database SQLite application in intelligent remote monitoring system[C]// Proceedings of the 2010 International Forum on Information Technology and Applications. Piscataway: IEEE, 2010, 2: 96-100. | 
																													
																						| 5 | XU Y, YANG B, MA S, et al. Research and application of integrated SQLite based on ground meteorological observation [C]// Proceedings of the 2019 International Conference on Meteorology Observations. Piscataway: IEEE, 2019: 1-4. | 
																													
																						| 6 | SHMUELI E, VAISENBERG R, ELOVICI Y, et al. Database encryption: an overview of contemporary challenges and design considerations [J]. ACM SIGMOD Record, 2010, 38(3): 29-34. | 
																													
																						| 7 | 赵宝献, 秦小麟. 数据库访问控制研究综述[J]. 计算机科学, 2005, 32(1): 88-91. | 
																													
																						|  | ZHAO B X, QIN X L. A survey on the database access controls [J]. Computer Science, 2005, 32(1): 88-91. | 
																													
																						| 8 | 褚龙现. SQLite数据库加密的分析与设计[J]. 电子设计工程, 2014, 22(16): 191-193. | 
																													
																						|  | CHU L X. The analysis and design of SQLite database encryption [J]. Electronic Design Engineering, 2014, 22(16): 191-193. | 
																													
																						| 9 | WANG Y, SHEN Y, SU C, et al. CryptSQLite: SQLite with high data security [J]. IEEE Transactions on Computers, 2020, 69(5): 666-678. | 
																													
																						| 10 | 何文才, 马鹏斐, 刘培鹤, 等. 基于Android平台的SQLite数据库加密研究[J]. 计算机应用与软件, 2019, 36(10): 310-315. | 
																													
																						|  | HE W C, MA P F, LIU P H, et al. SQLite database encryption based on Android platform[J]. Computer Applications and Software, 2019, 36(10): 310-315. | 
																													
																						| 11 | 吴良波, 金连甫. 离线应用本地数据存储设计与实现[J]. 计算机工程与设计, 2010, 31(6): 1236-1239. | 
																													
																						|  | WU L B, JIN L F. Design and implementation of local data storage for offline application [J]. Computer Engineering and Design, 2010, 31(6): 1236-1239. | 
																													
																						| 12 | AKOWUAH F, AHLAWAT A, DU W. Protecting sensitive data in Android SQLite databases using TrustZone [EB/OL]. [2023-11-10]. . | 
																													
																						| 13 | MUTTI S, BACIS E, PARABOSCHI S. SeSQLite: Security enhanced SQLite: mandatory access control for Android databases[C]// Proceedings of the 31st Annual Computer Security Applications Conference. New York: ACM, 2015: 411-420. | 
																													
																						| 14 | Zetetic. SQLcipher [DS/OL]. [2023-06-21]. . | 
																													
																						| 15 | 李征宇, 陈磊. 数据库性能评测指标及其测试方法研究[J]. 电子设计工程, 2011, 19(4): 4-5. | 
																													
																						|  | LI Z Y, CHEN L. Research on the testing method and performance evaluating and testing for database [J]. Electronic Design Engineering, 2011, 19(4): 4-5. | 
																													
																						| 16 | 廖顺和, 乐嘉锦. 嵌入式数据库SQLite加密方法分析与研究[J]. 计算机应用与软件, 2008, 25(10): 70-71. | 
																													
																						|  | LIAO S H, LE J J. Analysis and research of the encryption method for SQLite [J]. Computer Applications and Software, 2008, 25(10): 70-71. | 
																													
																						| 17 | 张烨平. 可验证完整性的加密SQLite技术研究与实现[D]. 西安:西安电子科技大学, 2021:36. | 
																													
																						|  | ZHANG Y P. Research and implementation of encrypted SQLite technology with integrity verification[D]. Xi’an: Xidian University, 2021:36. | 
																													
																						| 18 | O’NEIL E J, O’NEIL P E, WEIKUM G. The LRU-K page replacement algorithm for database disk buffering [J]. ACM SIGMOD Record, 1993, 22(2): 297-306. | 
																													
																						| 19 | Grouplens. MovieLens [DS/OL]. [2023-04-30]. . | 
																													
																						| 20 | TPC. Transaction processing performance council [DS/OL]. [2023-07-30]. . |