2015
DOI: 10.14257/astl.2015.93.08
|View full text |Cite
|
Sign up to set email alerts
|

Practical Database Encryption Scheme for Database-as-a-Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Another scheme [7] requires operations that are not database operations to be performed at the server. Joo [10] proposed a basic approach to the database encryption scheme in which an order column is added for each encrypted column. According to Kolesnikov and Shikfa [11], even an ideal encryption system with order information leaks other information.…”
Section: Related Workmentioning
confidence: 99%
“…Another scheme [7] requires operations that are not database operations to be performed at the server. Joo [10] proposed a basic approach to the database encryption scheme in which an order column is added for each encrypted column. According to Kolesnikov and Shikfa [11], even an ideal encryption system with order information leaks other information.…”
Section: Related Workmentioning
confidence: 99%