메뉴 건너뛰기




Volumn 3178, Issue , 2004, Pages 28-40

A structure preserving database encryption scheme

Author keywords

[No Author keywords available]

Indexed keywords

DATABASE SYSTEMS; INFORMATION MANAGEMENT; QUERY LANGUAGES;

EID: 33750722191     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30073-1_3     Document Type: Article
Times cited : (29)

References (23)
  • 4
    • 0015331056 scopus 로고
    • On the implementation of security measures in information systems
    • Conway, R.W., Maxwell, W.L. and Morgan, H.L.: On the implementation of security measures in information systems. Communications of the ACM 15(4) (1972) 211-220
    • (1972) Communications of the ACM , vol.15 , Issue.4 , pp. 211-220
    • Conway, R.W.1    Maxwell, W.L.2    Morgan, H.L.3
  • 5
    • 84942812332 scopus 로고
    • Protection - Principles and practice
    • AFIPS 417-429, Montrale, N.J.
    • Graham, G.S. and Denning, P.J.: Protection - Principles and practice. Proc. Spring Jt. Computer Conf., Vol. 40, AFIPS 417-429, Montrale, N.J. (1972)
    • (1972) Proc. Spring Jt. Computer Conf. , vol.40
    • Graham, G.S.1    Denning, P.J.2
  • 6
    • 0028543071 scopus 로고
    • A new dynamic access control scheme based on subjectobject-list
    • Hwang, M.S. and Yang, W.P.: A new dynamic access control scheme based on subjectobject-list. Data and Knowledge Engineering 14(1) (1994) 45-56
    • (1994) Data and Knowledge Engineering , vol.14 , Issue.1 , pp. 45-56
    • Hwang, M.S.1    Yang, W.P.2
  • 10
    • 0003508568 scopus 로고
    • FIPS, NBS
    • National Bureau of Standards. Data Encryption Standard. FIPS, NBS (1977)
    • (1977) Data Encryption Standard
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest, R.L., Shamir, A. and Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21(2) (1978) 120-126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 12
    • 0024012695 scopus 로고
    • The data encryption standard: Past and future
    • Smid, M.E. and Branstad, D.K.: The data encryption standard: past and future. Proc. IEEE 76(5) (1988) 550-559
    • (1988) Proc. IEEE , vol.76 , Issue.5 , pp. 550-559
    • Smid, M.E.1    Branstad, D.K.2
  • 14
  • 17
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, Wisconsin, USA
    • Hacigiimiis, H., Iyer, B., Li, C., and Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD'2002, Madison, Wisconsin, USA (2002)
    • (2002) Proc. of the ACM SIGMOD'2002
    • Hacigiimiis, H.1    Iyer, B.2    Li, C.3    Mehrotra, S.4
  • 18
    • 26444538232 scopus 로고    scopus 로고
    • A Framework for Efficient Storage Security in RDBMS
    • E. Bertino et al. (Eds.)
    • Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G. and Wu, Y.: A Framework for Efficient Storage Security in RDBMS. E. Bertino et al. (Eds.): EDBT 2004, LNCS 2992 (2004) 147-164
    • (2004) EDBT 2004, LNCS , vol.2992 , pp. 147-164
    • Iyer, B.1    Mehrotra, S.2    Mykletun, E.3    Tsudik, G.4    Wu, Y.5
  • 21
    • 84976748588 scopus 로고
    • On the Encipherment of Search Trees and Random Access Files
    • Bayer, R. and Metzger, J.K.-On the Encipherment of Search Trees and Random Access Files. ACM Trans Database Systems, Vol. 1 (1976) 37-52
    • (1976) ACM Trans Database Systems , vol.1 , pp. 37-52
    • Bayer, R.1    Metzger, J.K.2
  • 23
    • 0029478393 scopus 로고
    • A two-phase encryption scheme for enhancing database security
    • Hwang, M.S. and Yang, W.P.: A two-phase encryption scheme for enhancing database security. J. Systems and Software 31(12) (1995) 257-265
    • (1995) J. Systems and Software , vol.31 , Issue.12 , pp. 257-265
    • Hwang, M.S.1    Yang, W.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.