Advertisement

Computer Network Database Security Management Technology Optimization Path

  • Jianrong XiEmail author
Conference paper
  • 12 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1146)

Abstract

Along with the progress of network technology, Internet age, the rapid expansion of electronic devices, such as computers, computer bring a lot of convenience for People’s Daily lives, but at the same time the network is a double-edged sword, security problems emerge in endlessly, more and more get the attention of the people, for the network, the characteristics of openness. Therefore, the security management of computer network database has been paid more and more attention. As an important part of computer management, security management not only has a direct or indirect impact on the use of computer network, but also seriously affects the development of various fields. Therefore, this paper for the computer network database security management research, including security management characteristics security management objectives and security management technology, proposed to optimize the computer network database security management, take effective measures to provide support. It is expected that the discussion of this paper has a good reference for optimizing computer network technology and strengthening data security management in China.

Keywords

Computer network Database security management Technical optimization Network security 

References

  1. 1.
    Zegzhda, D.P., Pavlenko, E.Y.: Cyber-physical system homeostatic security management. Autom. Control Comput. Sci. 51(8), 805–816 (2017)CrossRefGoogle Scholar
  2. 2.
    Tati, S., Rager, S., Ko, B.J.: NetCSI: a generic fault diagnosis algorithm for large-scale failures in computer networks. IEEE Trans. Dependable Secure Comput. 13(3), 355–368 (2016)CrossRefGoogle Scholar
  3. 3.
    Türker, İ., Albayrak, Z.: Spreading in scale-free computer networks with improved clustering. Int. J. Mod. Phys. B 32(28), 1850309 (2018)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Osipov, V.Y., Vorobiev, V.I., Levonevskiy, D.K.: Problems of protection against false information in computer networks. Tr. SPIIRAN 4(53), 97–117 (2017)Google Scholar
  5. 5.
    Liu, X., Zhou, S.: An encrypted data model for distributed keyword search in computer networks. J. Comput. Theor. Nanosci. 13(12), 9678–9682 (2016)CrossRefGoogle Scholar
  6. 6.
    Cui, Y., Shi, J., Wang, Z.: Fault propagation reasoning and diagnosis for computer networks using cyclic temporal constraint network model. IEEE Trans. Syst. Man Cybern. Syst. 47(8), 1–14 (2016)CrossRefGoogle Scholar
  7. 7.
    Leite, F.N., Hoji, E.S., Junior, H.A.: A blended learning method applied in data communication and computer networks subject. IEEE Lat. Am. Trans. 16(1), 163–171 (2018)CrossRefGoogle Scholar
  8. 8.
    Cheng, Z., Yiwen, X., Cui, J.: The formation of employee retention basing on computer communication networks. Wireless Pers. Commun. 103(7), 1–15 (2018)Google Scholar
  9. 9.
    Kopanov, P., Tchalakov, I.: ‘Stacked’ actor-networks and their computer modelling: the problem of identity. Int. J. Actor-Netw. Theor. Technol. Innov. 8(4), 52–69 (2016)CrossRefGoogle Scholar
  10. 10.
    Hosseini, S., Azgomi, M.A.: A model for malware propagation in scale-free networks based on rumor spreading process. Comput. Netw. 108(C), 97–107 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Computer CollegeWeinan Normal UniversityWeinanPeople’s Republic of China

Personalised recommendations