메뉴 건너뛰기




Volumn , Issue , 2006, Pages 957-962

Securely sharing data in encrypted databases

Author keywords

Access control; Data sharing; Database encryption; RBAC

Indexed keywords

ACCESS CONTROL; ALGORITHMS; COMPUTER SUPPORTED COOPERATIVE WORK; DATA PROCESSING; DATABASE SYSTEMS;

EID: 34547652877     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSCWD.2006.253101     Document Type: Conference Paper
Times cited : (1)

References (16)
  • 1
    • 33947109885 scopus 로고    scopus 로고
    • Chip-Secured Data Access: Confidential Data on Untrusted Servers
    • Hong Kong, China
    • I. Bouganim, and P. Pucheral, "Chip-Secured Data Access: Confidential Data on Untrusted Servers", Proceedings of the 28th VLDB Conference, Hong Kong, China, 2002
    • (2002) Proceedings of the 28th VLDB Conference
    • Bouganim, I.1    Pucheral, P.2
  • 3
    • 34547650697 scopus 로고    scopus 로고
    • Threat Model and Countermeasure Analysis of OSCAR Secure Database Management System
    • G. Chen, et al., "Threat Model and Countermeasure Analysis of OSCAR Secure Database Management System", Journal of Computer Research and Development, 2004, 41, pp. 72-77.
    • (2004) Journal of Computer Research and Development , vol.41 , pp. 72-77
    • Chen, G.1
  • 4
    • 0004154170 scopus 로고
    • An Introduction to Database Systems
    • C.J. Date, "An Introduction to Database Systems", Fifth ed. Vol. 1, 1990.
    • (1990) Fifth ed , vol.1
    • Date, C.J.1
  • 8
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over Encrypted Data in the Database-Service-Provider Model
    • H. Hacigumus, et al., "Executing SQL over Encrypted Data in the Database-Service-Provider Model", ACMSIGMOD, 2002.
    • (2002) ACMSIGMOD
    • Hacigumus, H.1
  • 11
    • 34547661840 scopus 로고    scopus 로고
    • Microsoft, Security in SQL Server 2005, 2004, http://www.microsoft.com/sql/2005/productinfo/securityfeatures_2.asp.
    • Microsoft, "Security in SQL Server 2005", 2004, http://www.microsoft.com/sql/2005/productinfo/securityfeatures_2.asp.
  • 12
    • 34547692821 scopus 로고    scopus 로고
    • Oracle, Database Encryption in Oracle 9i, 2001
    • Oracle, "Database Encryption in Oracle 9i", 2001
  • 13
    • 84884311106 scopus 로고    scopus 로고
    • Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies
    • S. Osborn, R.S. Sandhu, and Q. Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies", ACM Transactions on Information and System Security, 2000, 3(2), pp. 85-106.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.S.2    Munawer, Q.3
  • 16
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • R.S. Sandhu, et al., "Role-based access control models", IEEE Computer, 1996, 29(2), pp. 38-47.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.