搜索结果: 1-5 共查到“军事学 SQL”相关记录5条 . 查询时间(0.187 秒)
Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes
searchable encryption blind indexing SQL database security
2019/7/15
Rapid advances in Internet technologies have fostered the emergence of the “software as a service” model for enterprise computing. The “Database as a Service” model provides users with the power to cr...
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
verifiable computation interactive arguments verifiable database queries
2017/11/28
Cloud database systems such as Amazon RDS or Google Cloud SQL enable the outsourcing of a large database to a server who then responds to SQL queries. A natural problem here is to efficiently verify t...
We show how to encrypt a relational database in such a way that it can efficiently support a large class of SQL queries. Our construction is based solely on structured encryption and does not make use...
Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud
Integrity Check Dynamic Database Outsource SQL Query Authenticated Data Structure Cloud Storage
2013/2/21
With the rising trend of outsourcing databases to the cloud, it is important to allow clients to securely verify that their queries on the outsourced databases are correctly executed by the cloud. Exi...
SQL注入攻击及其防范检测技术研究
SQL注入攻击 防范检测技术 网页木马
2008/5/20
本文简要介绍了SQL注入攻击的原理,SQL注入攻击实现过程,配合网页木马实施网络入侵的方法,给出了SQL注入攻击的检测方法,并在此基础上给出了一种SQL注入攻击的自动防范模型。