{"id":"https://openalex.org/W4391093509","doi":"https://doi.org/10.1109/iciscae59047.2023.10393551","title":"Research on Database Information Transmission Security Protection System under Computer Big Data Technology","display_name":"Research on Database Information Transmission Security Protection System under Computer Big Data Technology","publication_year":2023,"publication_date":"2023-09-23","ids":{"openalex":"https://openalex.org/W4391093509","doi":"https://doi.org/10.1109/iciscae59047.2023.10393551"},"language":"en","primary_location":{"id":"doi:10.1109/iciscae59047.2023.10393551","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iciscae59047.2023.10393551","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 6th International Conference on Information Systems and Computer Aided Education (ICISCAE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100569835","display_name":"Zhijian Zhao","orcid":"https://orcid.org/0009-0001-5923-2776"},"institutions":[{"id":"https://openalex.org/I4210164796","display_name":"Nanjing Polytechnic Institute","ror":"https://ror.org/05tt6m403","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210164796"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhijian Zhao","raw_affiliation_strings":["Jiangsu Union Technical Institute,Nanjing Engineering Branch,Nanjing,China","Nanjing Engineering Branch, Jiangsu Union Technical Institute, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Union Technical Institute,Nanjing Engineering Branch,Nanjing,China","institution_ids":["https://openalex.org/I4210164796"]},{"raw_affiliation_string":"Nanjing Engineering Branch, Jiangsu Union Technical Institute, Nanjing, China","institution_ids":["https://openalex.org/I4210164796"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100569835"],"corresponding_institution_ids":["https://openalex.org/I4210164796"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.45300695,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"49","issue":null,"first_page":"356","last_page":"360"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14139","display_name":"E-commerce and Technology Innovations","score":0.5604000091552734,"subfield":{"id":"https://openalex.org/subfields/1403","display_name":"Business and International Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T14139","display_name":"E-commerce and Technology Innovations","score":0.5604000091552734,"subfield":{"id":"https://openalex.org/subfields/1403","display_name":"Business and International Management"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7625535726547241},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5362436771392822},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49723246693611145},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.47794416546821594},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4557908773422241},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.436175674200058},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42824018001556396},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.42612919211387634},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.41174066066741943},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37263205647468567},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3325576186180115},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.3081057071685791},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2668469548225403}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7625535726547241},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5362436771392822},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49723246693611145},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.47794416546821594},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4557908773422241},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.436175674200058},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42824018001556396},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.42612919211387634},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.41174066066741943},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37263205647468567},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3325576186180115},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3081057071685791},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2668469548225403}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iciscae59047.2023.10393551","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iciscae59047.2023.10393551","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 6th International Conference on Information Systems and Computer Aided Education (ICISCAE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2392897293","https://openalex.org/W2033357182","https://openalex.org/W2946162884","https://openalex.org/W2373080253","https://openalex.org/W2735050489","https://openalex.org/W64368977","https://openalex.org/W2800653357","https://openalex.org/W2353805290","https://openalex.org/W147109933","https://openalex.org/W2564877849"],"abstract_inverted_index":{"This":[0],"paper":[1,16],"designs":[2],"the":[3,8,51,89,102],"overall":[4],"logical":[5],"architecture":[6],"of":[7,54,85],"big":[9],"data":[10,55,79],"security":[11,62],"supervision":[12],"platform.":[13],"Firstly,":[14],"this":[15],"proposes":[17],"a":[18,28,39,83],"random":[19,29,41],"address":[20,30,43],"generation":[21],"mechanism":[22,31,45],"compatible":[23],"with":[24],"IPv6":[25],"Internet":[26],"transmission,":[27],"supporting":[32,46],"time-difference":[33],"redundancy":[34],"at":[35],"both":[36],"ends,":[37],"and":[38,59,94,105],"lock-free":[40],"IP":[42],"selection":[44],"multithreading.":[47],"Then":[48],"according":[49],"to":[50],"different":[52],"requirements":[53],"encryption":[56],"desensitization,":[57],"operation":[58],"maintenance":[60],"control,":[61],"audit,":[63],"watermark":[64],"seal,":[65],"leakage":[66],"protection,":[67],"application":[68],"gateway":[69],"function":[70],"design":[71],"proposed":[72,90],"\"static":[73],"desensitization":[74,80],"+":[75],"dynamic":[76],"desensitization\"":[77],"government":[78],"solution.":[81],"Finally,":[82],"series":[84],"experiments":[86],"show":[87],"that":[88],"moving":[91],"target":[92],"defense":[93],"access":[95],"control":[96],"technology":[97],"has":[98,106],"less":[99],"impact":[100],"on":[101],"original":[103],"network":[104],"high":[107],"security.":[108]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
