Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis
With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern informati...
Ausführliche Beschreibung
Autor*in: |
Chen Qunlin [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch ; Französisch |
Erschienen: |
2020 |
---|
Übergeordnetes Werk: |
In: E3S Web of Conferences - EDP Sciences, 2013, 185, p 02033(2020) |
---|---|
Übergeordnetes Werk: |
volume:185, p 02033 ; year:2020 |
Links: |
---|
DOI / URN: |
10.1051/e3sconf/202018502033 |
---|
Katalog-ID: |
DOAJ053913108 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ053913108 | ||
003 | DE-627 | ||
005 | 20230308180142.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230227s2020 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1051/e3sconf/202018502033 |2 doi | |
035 | |a (DE-627)DOAJ053913108 | ||
035 | |a (DE-599)DOAJcf88b808df5645b982aa894b550fc344 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng |a fre | ||
050 | 0 | |a GE1-350 | |
100 | 0 | |a Chen Qunlin |e verfasserin |4 aut | |
245 | 1 | 0 | |a Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis |
264 | 1 | |c 2020 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern information technology. At the same time, the security of the database in the management information system has received increasing attention. This article studies the implementation method of database security in management information system based on big data analysis, hoping to provide reference for relevant people's research. | ||
653 | 0 | |a Environmental sciences | |
773 | 0 | 8 | |i In |t E3S Web of Conferences |d EDP Sciences, 2013 |g 185, p 02033(2020) |w (DE-627)778372081 |w (DE-600)2755680-3 |x 22671242 |7 nnns |
773 | 1 | 8 | |g volume:185, p 02033 |g year:2020 |
856 | 4 | 0 | |u https://doi.org/10.1051/e3sconf/202018502033 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/cf88b808df5645b982aa894b550fc344 |z kostenfrei |
856 | 4 | 0 | |u https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/45/e3sconf_iceeb2020_02033.pdf |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2267-1242 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2027 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 185, p 02033 |j 2020 |
author_variant |
c q cq |
---|---|
matchkey_str |
article:22671242:2020----::eerhnhipeettomtoodtbsscrtimngmnifrain |
hierarchy_sort_str |
2020 |
callnumber-subject-code |
GE |
publishDate |
2020 |
allfields |
10.1051/e3sconf/202018502033 doi (DE-627)DOAJ053913108 (DE-599)DOAJcf88b808df5645b982aa894b550fc344 DE-627 ger DE-627 rakwb eng fre GE1-350 Chen Qunlin verfasserin aut Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern information technology. At the same time, the security of the database in the management information system has received increasing attention. This article studies the implementation method of database security in management information system based on big data analysis, hoping to provide reference for relevant people's research. Environmental sciences In E3S Web of Conferences EDP Sciences, 2013 185, p 02033(2020) (DE-627)778372081 (DE-600)2755680-3 22671242 nnns volume:185, p 02033 year:2020 https://doi.org/10.1051/e3sconf/202018502033 kostenfrei https://doaj.org/article/cf88b808df5645b982aa894b550fc344 kostenfrei https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/45/e3sconf_iceeb2020_02033.pdf kostenfrei https://doaj.org/toc/2267-1242 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2027 GBV_ILN_2055 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 185, p 02033 2020 |
spelling |
10.1051/e3sconf/202018502033 doi (DE-627)DOAJ053913108 (DE-599)DOAJcf88b808df5645b982aa894b550fc344 DE-627 ger DE-627 rakwb eng fre GE1-350 Chen Qunlin verfasserin aut Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern information technology. At the same time, the security of the database in the management information system has received increasing attention. This article studies the implementation method of database security in management information system based on big data analysis, hoping to provide reference for relevant people's research. Environmental sciences In E3S Web of Conferences EDP Sciences, 2013 185, p 02033(2020) (DE-627)778372081 (DE-600)2755680-3 22671242 nnns volume:185, p 02033 year:2020 https://doi.org/10.1051/e3sconf/202018502033 kostenfrei https://doaj.org/article/cf88b808df5645b982aa894b550fc344 kostenfrei https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/45/e3sconf_iceeb2020_02033.pdf kostenfrei https://doaj.org/toc/2267-1242 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2027 GBV_ILN_2055 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 185, p 02033 2020 |
allfields_unstemmed |
10.1051/e3sconf/202018502033 doi (DE-627)DOAJ053913108 (DE-599)DOAJcf88b808df5645b982aa894b550fc344 DE-627 ger DE-627 rakwb eng fre GE1-350 Chen Qunlin verfasserin aut Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern information technology. At the same time, the security of the database in the management information system has received increasing attention. This article studies the implementation method of database security in management information system based on big data analysis, hoping to provide reference for relevant people's research. Environmental sciences In E3S Web of Conferences EDP Sciences, 2013 185, p 02033(2020) (DE-627)778372081 (DE-600)2755680-3 22671242 nnns volume:185, p 02033 year:2020 https://doi.org/10.1051/e3sconf/202018502033 kostenfrei https://doaj.org/article/cf88b808df5645b982aa894b550fc344 kostenfrei https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/45/e3sconf_iceeb2020_02033.pdf kostenfrei https://doaj.org/toc/2267-1242 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2027 GBV_ILN_2055 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 185, p 02033 2020 |
allfieldsGer |
10.1051/e3sconf/202018502033 doi (DE-627)DOAJ053913108 (DE-599)DOAJcf88b808df5645b982aa894b550fc344 DE-627 ger DE-627 rakwb eng fre GE1-350 Chen Qunlin verfasserin aut Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern information technology. At the same time, the security of the database in the management information system has received increasing attention. This article studies the implementation method of database security in management information system based on big data analysis, hoping to provide reference for relevant people's research. Environmental sciences In E3S Web of Conferences EDP Sciences, 2013 185, p 02033(2020) (DE-627)778372081 (DE-600)2755680-3 22671242 nnns volume:185, p 02033 year:2020 https://doi.org/10.1051/e3sconf/202018502033 kostenfrei https://doaj.org/article/cf88b808df5645b982aa894b550fc344 kostenfrei https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/45/e3sconf_iceeb2020_02033.pdf kostenfrei https://doaj.org/toc/2267-1242 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2027 GBV_ILN_2055 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 185, p 02033 2020 |
allfieldsSound |
10.1051/e3sconf/202018502033 doi (DE-627)DOAJ053913108 (DE-599)DOAJcf88b808df5645b982aa894b550fc344 DE-627 ger DE-627 rakwb eng fre GE1-350 Chen Qunlin verfasserin aut Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern information technology. At the same time, the security of the database in the management information system has received increasing attention. This article studies the implementation method of database security in management information system based on big data analysis, hoping to provide reference for relevant people's research. Environmental sciences In E3S Web of Conferences EDP Sciences, 2013 185, p 02033(2020) (DE-627)778372081 (DE-600)2755680-3 22671242 nnns volume:185, p 02033 year:2020 https://doi.org/10.1051/e3sconf/202018502033 kostenfrei https://doaj.org/article/cf88b808df5645b982aa894b550fc344 kostenfrei https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/45/e3sconf_iceeb2020_02033.pdf kostenfrei https://doaj.org/toc/2267-1242 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2027 GBV_ILN_2055 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 185, p 02033 2020 |
language |
English French |
source |
In E3S Web of Conferences 185, p 02033(2020) volume:185, p 02033 year:2020 |
sourceStr |
In E3S Web of Conferences 185, p 02033(2020) volume:185, p 02033 year:2020 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Environmental sciences |
isfreeaccess_bool |
true |
container_title |
E3S Web of Conferences |
authorswithroles_txt_mv |
Chen Qunlin @@aut@@ |
publishDateDaySort_date |
2020-01-01T00:00:00Z |
hierarchy_top_id |
778372081 |
id |
DOAJ053913108 |
language_de |
englisch franzoesisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ053913108</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230308180142.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230227s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1051/e3sconf/202018502033</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ053913108</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJcf88b808df5645b982aa894b550fc344</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield><subfield code="a">fre</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">GE1-350</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Chen Qunlin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2020</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern information technology. At the same time, the security of the database in the management information system has received increasing attention. This article studies the implementation method of database security in management information system based on big data analysis, hoping to provide reference for relevant people's research.</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Environmental sciences</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">E3S Web of Conferences</subfield><subfield code="d">EDP Sciences, 2013</subfield><subfield code="g">185, p 02033(2020)</subfield><subfield code="w">(DE-627)778372081</subfield><subfield code="w">(DE-600)2755680-3</subfield><subfield code="x">22671242</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:185, p 02033</subfield><subfield code="g">year:2020</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1051/e3sconf/202018502033</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/cf88b808df5645b982aa894b550fc344</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/45/e3sconf_iceeb2020_02033.pdf</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2267-1242</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">185, p 02033</subfield><subfield code="j">2020</subfield></datafield></record></collection>
|
callnumber-first |
G - Geography, Anthropology, Recreation |
author |
Chen Qunlin |
spellingShingle |
Chen Qunlin misc GE1-350 misc Environmental sciences Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis |
authorStr |
Chen Qunlin |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)778372081 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
GE1-350 |
illustrated |
Not Illustrated |
issn |
22671242 |
topic_title |
GE1-350 Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis |
topic |
misc GE1-350 misc Environmental sciences |
topic_unstemmed |
misc GE1-350 misc Environmental sciences |
topic_browse |
misc GE1-350 misc Environmental sciences |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
E3S Web of Conferences |
hierarchy_parent_id |
778372081 |
hierarchy_top_title |
E3S Web of Conferences |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)778372081 (DE-600)2755680-3 |
title |
Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis |
ctrlnum |
(DE-627)DOAJ053913108 (DE-599)DOAJcf88b808df5645b982aa894b550fc344 |
title_full |
Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis |
author_sort |
Chen Qunlin |
journal |
E3S Web of Conferences |
journalStr |
E3S Web of Conferences |
callnumber-first-code |
G |
lang_code |
eng fre |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2020 |
contenttype_str_mv |
txt |
author_browse |
Chen Qunlin |
container_volume |
185, p 02033 |
class |
GE1-350 |
format_se |
Elektronische Aufsätze |
author-letter |
Chen Qunlin |
doi_str_mv |
10.1051/e3sconf/202018502033 |
title_sort |
research on the implementation method of database security in management information system based on big data analysis |
callnumber |
GE1-350 |
title_auth |
Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis |
abstract |
With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern information technology. At the same time, the security of the database in the management information system has received increasing attention. This article studies the implementation method of database security in management information system based on big data analysis, hoping to provide reference for relevant people's research. |
abstractGer |
With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern information technology. At the same time, the security of the database in the management information system has received increasing attention. This article studies the implementation method of database security in management information system based on big data analysis, hoping to provide reference for relevant people's research. |
abstract_unstemmed |
With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern information technology. At the same time, the security of the database in the management information system has received increasing attention. This article studies the implementation method of database security in management information system based on big data analysis, hoping to provide reference for relevant people's research. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2027 GBV_ILN_2055 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
title_short |
Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis |
url |
https://doi.org/10.1051/e3sconf/202018502033 https://doaj.org/article/cf88b808df5645b982aa894b550fc344 https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/45/e3sconf_iceeb2020_02033.pdf https://doaj.org/toc/2267-1242 |
remote_bool |
true |
ppnlink |
778372081 |
callnumber-subject |
GE - Environmental Sciences |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.1051/e3sconf/202018502033 |
callnumber-a |
GE1-350 |
up_date |
2024-07-03T20:16:10.123Z |
_version_ |
1803590324846592000 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ053913108</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230308180142.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230227s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1051/e3sconf/202018502033</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ053913108</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJcf88b808df5645b982aa894b550fc344</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield><subfield code="a">fre</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">GE1-350</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Chen Qunlin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2020</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the rapid development of China’s society and economy, and the support of modern information technology, we have entered the era of big data. The amount of data in management information systems continues to increase. Big data has become an inevitable trend in the development of modern information technology. At the same time, the security of the database in the management information system has received increasing attention. This article studies the implementation method of database security in management information system based on big data analysis, hoping to provide reference for relevant people's research.</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Environmental sciences</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">E3S Web of Conferences</subfield><subfield code="d">EDP Sciences, 2013</subfield><subfield code="g">185, p 02033(2020)</subfield><subfield code="w">(DE-627)778372081</subfield><subfield code="w">(DE-600)2755680-3</subfield><subfield code="x">22671242</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:185, p 02033</subfield><subfield code="g">year:2020</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1051/e3sconf/202018502033</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/cf88b808df5645b982aa894b550fc344</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/45/e3sconf_iceeb2020_02033.pdf</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2267-1242</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">185, p 02033</subfield><subfield code="j">2020</subfield></datafield></record></collection>
|
score |
7.398961 |