Proceedings 2001 International Database Engineering and Applications Symposium
DOI: 10.1109/ideas.2001.938095
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography and relational database management systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0
2

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(14 citation statements)
references
References 7 publications
0
12
0
2
Order By: Relevance
“…It is complementary to access control and both of them should be used to guide the storage and access of confidential data in a database system. In [1,2,3,4], database encryption mechanism could provide the following security.…”
Section: Introductionmentioning
confidence: 99%
“…It is complementary to access control and both of them should be used to guide the storage and access of confidential data in a database system. In [1,2,3,4], database encryption mechanism could provide the following security.…”
Section: Introductionmentioning
confidence: 99%
“…The data are kept encrypted at the server and a client is granted access to subparts of them according to the decryption keys in its possession. Sophisticated variations of this basic model have been designed in different context, such as DSP [HIL02], database server security [HeW01], nonprofit and for-profit publishing [MiS03,BCF01,Med] and multilevel databases [AkT82,BZN01,RRN02]. These models differ in several ways: data access model (pulled vs. pushed), access right model (DAC, RBAC, MAC), encryption scheme, key delivery mechanism and granularity of sharing.…”
Section: Introductionmentioning
confidence: 99%
“…Database security is a wide research area [26,23] and includes topics such as statistical database security [21], intrusion detection [34], and most recently privacy preserving data mining [22], and related papers in designing information systems that protect the privacy and ownership of individual information while not impeding the flow of information, include [22,23,24,25]. Prior work [7] [2] does not address the critical issue of performance. But in this work, we have addressed and evaluated the most critical issue for the success of encryption in databases, performance.…”
Section: Introductionmentioning
confidence: 99%