메뉴 건너뛰기




Volumn 4602 LNCS, Issue , 2007, Pages 177-194

Design and analysis of querying encrypted data in relational databases

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; RELATIONAL DATABASE SYSTEMS; SECURITY OF DATA; ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 37849045956     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73538-0_14     Document Type: Conference Paper
Times cited : (9)

References (24)
  • 1
    • 37849012691 scopus 로고    scopus 로고
    • Jr, T.Z.: An ominous milestone: 100 million data leaks. New York Times (December 18,2006)
    • Jr, T.Z.: An ominous milestone: 100 million data leaks. New York Times (December 18,2006)
  • 2
    • 37849008752 scopus 로고    scopus 로고
    • Trinanes, J.A.: Database security in high risk environments.Technical report, governmentsecurity.org (2005) http://www.governmentsecurity.org/ articles/DatabaseSecurityinHighRiskEn%vironments.php.
    • Trinanes, J.A.: Database security in high risk environments.Technical report, governmentsecurity.org (2005) http://www.governmentsecurity.org/ articles/DatabaseSecurityinHighRiskEn%vironments.php.
  • 3
    • 0037077422 scopus 로고    scopus 로고
    • Standard for privacy of individually identifiable health information. Federal Register 67(157), 53181-53273 (2002)
    • Standard for privacy of individually identifiable health information. Federal Register 67(157), 53181-53273 (2002)
  • 5
    • 37849002581 scopus 로고    scopus 로고
    • Microsoft: Security features in microsoft sql server 2005
    • Technical report, Microsoft Corporation
    • Microsoft: Security features in microsoft sql server 2005. Technical report, Microsoft Corporation (2005), http://www.microsoft.com/sql/2005/ productinfo/
    • (2005)
  • 6
    • 37849051972 scopus 로고    scopus 로고
    • Ibm data encryption for ims and db2 databases
    • IBM:, Technical report, IBM Corporation
    • IBM: Ibm data encryption for ims and db2 databases. Technical report, IBM Corporation (2006), http://www-306.ibm.com/software/data/db2imstools/db2tools/ ibmencrypt.html
    • (2006)
  • 8
    • 84976748588 scopus 로고
    • On the encipherment of search trees and random access files
    • Bayer, R., Metzger, J.K.: On the encipherment of search trees and random access files. ACM Trans. Database Syst. 1(1), 37-52 (1976), http://doi.acm.org/ 10.1145/320434.320445
    • (1976) ACM Trans. Database Syst , vol.1 , Issue.1 , pp. 37-52
    • Bayer, R.1    Metzger, J.K.2
  • 13
    • 26444538232 scopus 로고    scopus 로고
    • Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A framework for efficient storage security in rdbms. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, 2992, Springer, Heidelberg (2004)
    • Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A framework for efficient storage security in rdbms. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, Springer, Heidelberg (2004)
  • 14
    • 33750722191 scopus 로고    scopus 로고
    • Elovici, Y., Shmueli, E., nberg, R.W., Gudes, E.: A structure preserving database encryption scheme. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, 3178, Springer, Heidelberg (2004), http://www.extra.research. philips.com/sdm-workshop/RonenSDM.pdf
    • Elovici, Y., Shmueli, E., nberg, R.W., Gudes, E.: A structure preserving database encryption scheme. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, Springer, Heidelberg (2004), http://www.extra.research. philips.com/sdm-workshop/RonenSDM.pdf
  • 15
    • 37849034915 scopus 로고    scopus 로고
    • NIST: Advanced encryption standard (aes). Technical Report NIST Special Publication FIPS-197, National Institute of Standards and Technology (2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
    • NIST: Advanced encryption standard (aes). Technical Report NIST Special Publication FIPS-197, National Institute of Standards and Technology (2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
  • 16
    • 37849016899 scopus 로고    scopus 로고
    • Recommendation for block cipher modes of operation methods and techniques. Technical Report NIST Special Publication 800-38A, National Institute of Standards and Technology (2001), http://csrc.nist.gov/publications/ nistpubs/800-38a/sp800-38a.pdf
    • Recommendation for block cipher modes of operation methods and techniques. Technical Report NIST Special Publication 800-38A, National Institute of Standards and Technology (2001), http://csrc.nist.gov/publications/ nistpubs/800-38a/sp800-38a.pdf
  • 17
    • 37849006448 scopus 로고    scopus 로고
    • Data encryption standard (des). Technical Report FIPS PUB 46-2, National Institutes of Standards and Technology (1988)
    • Data encryption standard (des). Technical Report FIPS PUB 46-2, National Institutes of Standards and Technology (1988)
  • 18
    • 0342645557 scopus 로고
    • The blowfish encryption algorithm
    • April
    • Schneier, B.: The blowfish encryption algorithm. Dr. Dobb's Journal, 38-40 (April 1994)
    • (1994) Dr. Dobb's Journal , vol.38-40
    • Schneier, B.1
  • 21
    • 37849030739 scopus 로고    scopus 로고
    • IBM
    • IBM: Table Space Design, http://publib.boulder.ibm.com/infocenter/db21uw/ v9/index.jsp?topic=/com%.ibm.db2.udb.admin.doc/doc/c0004935.htm
    • Table Space Design
  • 22
    • 0042997230 scopus 로고    scopus 로고
    • Idea: A cipher for muldimedia architectures?
    • Tavares, S, Meijer, H, eds, Springer-Verlag, Heidelberg
    • Lipmaa, H.: Idea: A cipher for muldimedia architectures? In: Tavares, S., Meijer, H. (eds.) Selected Areas in Cryptography '98, Springer-Verlag, Heidelberg (1998)
    • (1998) Selected Areas in Cryptography '98
    • Lipmaa, H.1
  • 24
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.