Font Size: a A A

Study On Protecting Data Integrity In Intranet

Posted on:2006-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:J W WangFull Text:PDF
GTID:2178360182470072Subject:Control Theory and Engineering
Abstract/Summary:PDF Full Text Request
Enterprise informatization is a developing tide inevitably. But it is worrying because digital information can be copied easily and modified no trace. It is well known that 'Credit standing' decides an enterprise's life, especially for market economy. The dependability of the data in Intranet is a very important issue for both enterprise and society. In this thesis, We summarized my studies about data integrity, and provided a solution for designing an enterprise information management system.1 Discuss the meaning of protecting data and data integrity in Intranet Security and integrity are two important aspects about protecting data.In order to protect data integrity, it is necessary to prevent the data that inputted into and stored in a computer system or transmitting on a network from unauthorized modification and accedintal destruction. Aim at an Intranet, we make sure that the main factor impacting the data integrity is within the Intranet. The integrity of the data in an Intranet consists of database integrity, archive originality and transmitting losslessly.2 Investigate description methods about the data relations in an enterprise and rules about referential integrityAccording to the properties of business data, we propose a set of description methods about the data relations in an enterprise and a set of rules about referential integrity, after we have studied the IDEF1X specification carefully.3 Present a simple algorithm finding candidate-key in relational model Finding candidate-key is the groundwork to design a relationaldatabase. Both entity integrity and referential integrity based on primary key are two important kinds of constraint. This algorithm is very simple and useful, and maneuverable.4 Propose a three-phase policy and solution to protect data integrity in Intranet by checking data inputting, constraining data storing and verifying data transmittingWe analyze and sum up the method about verifying the integrity of data inputting in detail when we develop an application with a tool such as PowerBuilder and Oracle Forms. On the other hand, we discuss the dataintegrity functions of RDBMS (e.g. Oracle) in detail, and study the conceptand policies of archive's integrity, and propose an idea to confirm anarchive's integrity with MD5 algorithm.5 Design data integrity on campus information sitesWe design a solution about data integrity on campus information sitesusing the approach described in this thesis.
Keywords/Search Tags:Intranet, Data integrity, Data-Relation, Candidate-Key, Archive integrity
PDF Full Text Request
Related items