1994
DOI: 10.1016/0167-4048(94)90003-5
|View full text |Cite
|
Sign up to set email alerts
|

Distributed database security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

1997
1997
2015
2015

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Table 2 shows the degree to which Oracle 7.2 implements this criteria. Oracle 7.2 does not have the ability to ensure a trusted path between client and server, or between server and server (Harris, et al, 1994). This means that there is no way in which the client could be certain that he/she is responding to the trusted server when passing user IDs and passwords in an attempt to log onto the database.…”
Section: Trusted Pathmentioning
confidence: 99%
See 3 more Smart Citations
“…Table 2 shows the degree to which Oracle 7.2 implements this criteria. Oracle 7.2 does not have the ability to ensure a trusted path between client and server, or between server and server (Harris, et al, 1994). This means that there is no way in which the client could be certain that he/she is responding to the trusted server when passing user IDs and passwords in an attempt to log onto the database.…”
Section: Trusted Pathmentioning
confidence: 99%
“…This protocol makes use of a different encryption key for each session. Every session the client opens with the server will, therefore, have the same password encrypted to different values (Harris, et al, 1994), making it very difficult for an eavesdropper to try and decrypt the encrypted password.…”
Section: Trusted Pathmentioning
confidence: 99%
See 2 more Smart Citations