Database encryption: an overview of contemporary challenges and design considerations

E Shmueli, R Vaisenberg, Y Elovici, C Glezer - ACM SIGMOD Record, 2010 - dl.acm.org
This article describes the major challenges and design considerations pertaining to
database encryption. The article first presents an attack model and the main relevant …

[PDF][PDF] Database security and encryption: A survey study

I Basharat, F Azam, AW Muzaffar - International Journal of Computer …, 2012 - Citeseer
Security in today's world is one of the important challenges that people are facing all over
the world in every aspect of their lives. Similarly security in electronic world has a great …

[PDF][PDF] Evaluating database security and cyber attacks: A relational approach

A Bamrara - Journal of Internet Banking and Commerce, 2015 - pdfs.semanticscholar.org
With a mounting number of enterprises become reliant on access to its data over the web,
the need for ample security measures is becoming more and more significant. Security of the …

[PDF][PDF] Security analysis of reverse encryption algorithm for databases

A Mousa, OS Faragallah, S El-Rabaie… - International Journal of …, 2013 - academia.edu
Encryption provides strong security for databases. To develop a database encryption
strategy, many factors must be taken into consideration. Organizations must balance …

A new lightweight database encryption scheme transparent to applications

L Liu, J Gai - 2008 6th IEEE International Conference on …, 2008 - ieeexplore.ieee.org
Database encryption, as a mechanism for active security enhancement, is a crucial
technique to protect data confidentiality. Two important objectives of designing an encrypted …

Bloom filter based index for query over encrypted character strings in database

L Liu, J Gai - 2009 WRI World Congress on Computer Science …, 2009 - ieeexplore.ieee.org
It is important to construct more efficient index used for query over encrypted character
strings in database. A few of approaches to deal with such issues have been worked out. In …

A three-layered model to implement data privacy policies

G Canfora, E Costante, I Pennino… - Computer Standards & …, 2008 - Elsevier
An increasing number of business-to-business and business-to-customer services are
accomplished by means of web technologies and mobile devices. As a consequence …

Securing SQL with access control for database as a service model

J Dave, ML Das - Proceedings of the Second International Conference …, 2016 - dl.acm.org
'Software as a service-SaaS'is a well known model used in cloud infrastructure, outsourcing
and pervasive computing. With the SaaS model, application service providers (ASP) …

Comparative evaluation of different methods of" Homomorphic Encryption" and" Traditional Encryption" on a dataset with current problems and developments

TS Patel, S Kolachina, DP Patel… - arXiv preprint arXiv …, 2022 - arxiv.org
A database is a prime target for cyber-attacks as it contains confidential, sensitive, or
protected information. With the increasing sophistication of the internet and dependencies …

[PDF][PDF] Evaluating the Performance of Reverse Encryption Algorithm (REA) on the Databases.

A Mousa, OS Faragallah, ES El-Rabaie, E Nigm - Int. Arab J. Inf. Technol., 2013 - ccis2k.org
Database encryption is a well established technology for protecting sensitive data.
Unfortunately, the integration of existing encryption techniques with database systems …