메뉴 건너뛰기




Volumn , Issue , 2005, Pages 146-153

A practical implementation of transparent encryption and separation of duties in enterprise databases: Protection against external and internal attacks on databases

Author keywords

Dial up networking; Internet services

Indexed keywords

BUILDING WALLS; DATA FIELDS; DATA LEVEL; DATA MINING MODELS; DATABASE RESEARCH; DATABASE SECURITY; DIAL-UP; ENCRYPTED DATABASE; ENCRYPTION METHODS; ENTERPRISE DATABASE; FIELD LEVEL; HARD DRIVES; INTERNET SERVICES; OPERATING REQUIREMENTS; POLICY DRIVEN; PRACTICAL EXPERIENCE; PRACTICAL IMPLEMENTATION; PROTECTIVE LAYERS; RELATIONAL DATABASE MANAGEMENT SYSTEMS; SECURITY ADMINISTRATOR; SECURITY PROBLEMS; SENSITIVE DATAS; SEPARATION OF DUTY; TRANSPARENT ENCRYPTION;

EID: 78649295848     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (26)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases
    • Dec. 1989
    • Adam, 1989. Security-control methods for statistical databases. ACMComputing Surveys, 21(4):515- 556, Dec. 1989.
    • (1989) ACMComputing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam1
  • 6
    • 0004238984 scopus 로고    scopus 로고
    • Addison-Wesley Publishing Company, Inc. 1982
    • Denning, 1997. Cryptography and Data Security. Addison-Wesley Publishing Company, Inc., 1982.
    • (1997) Cryptography and Data Security
    • Denning1
  • 9
    • 33749055569 scopus 로고    scopus 로고
    • O'Reilly & Associates, Inc. 1997
    • Garnkel, 1997. Web Security & Commerce. O'Reilly & Associates, Inc., 1997.
    • (1997) Web Security & Commerce
    • Garnkel1
  • 10
  • 12
    • 78649313704 scopus 로고    scopus 로고
    • Osborne/McGraw- Hill, 1997
    • Koch, 1997. The Complete Reference. Osborne/McGraw- Hill, 1997.
    • (1997) The Complete Reference
    • Koch1
  • 13
    • 0001632721 scopus 로고
    • Pseudo-random number generators in cryptography and number theory
    • American Mathematical Society, 1990.
    • Lagarias, 1990. Pseudo-random number generators in cryptography and number theory. InCryptology and Computational Number Theory, pages 115-143.American Mathematical Society, 1990.
    • (1990) InCryptology and Computational Number Theory , pp. 115-143
    • Lagarias1
  • 14
    • 78649262889 scopus 로고    scopus 로고
    • Improving DES hardware throughput for short operations
    • 2001
    • Lindemann, 2001. Improving DES Hardware Throughput for Short Operations, IBM Research Report, 2001.
    • (2001) IBM Research Report
    • Lindemann1
  • 15
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • 1993
    • Lunt, 1993. A survey of intrusion detection techniques. Computer & Security, 12(4), 1993.
    • (1993) Computer & Security , vol.12 , Issue.4
    • Lunt1
  • 16
    • 0003629990 scopus 로고
    • NIST, National Bureau of Standards FIPS Publication 180. Secure Hash Standard, 1993
    • NIST, 1993. National Bureau of Standards FIPS Publication 180. Secure Hash Standard, 1993.
    • (1993) Secure Hash Standard
  • 17
    • 0003508568 scopus 로고
    • NIST, 1977. National Bureau of Standards FIPS Publication 46
    • NIST, 1977. National Bureau of Standards FIPS Publication 46. Data Encryption Standard (DES), 1977.
    • (1977) Data Encryption Standard (DES)
  • 18
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • 1994
    • Neuman, 1994. Kerberos: An authentication service for computer networks. IEEE Communications, 32(9):33-38, 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman1
  • 19
    • 58149332399 scopus 로고    scopus 로고
    • Web site hacked; cards being canceled, Jan. 20, 2000
    • San Jose Mercury News, 2000. Web site hacked; cards being canceled, Jan. 20, 2000.
    • (2000) San Jose Mercury News
  • 20
    • 78649271773 scopus 로고    scopus 로고
    • Oracle, Technical White Paper., November 1999
    • Oracle, 1999. Technical White Paper. Database Security in Oracle8i, November 1999.
    • (1999) Database Security in Oracle8i
  • 21
    • 0004093038 scopus 로고    scopus 로고
    • John Wiley & Sons Ltd, 1997
    • Rankl, 1997.Smart Card Handbook. John Wiley & Sons Ltd, 1997.
    • (1997) Smart Card Handbook
    • Rankl1
  • 22
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • April,1992
    • Rivest, 1992. The MD5 Message-Digest Algorithm, RFC1321 (I). April 1992.
    • (1992) RFC1321 , Issue.1
    • Rivest1
  • 23
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public key cryptosystems
    • February 1978
    • Rivest, 1978. A method for obtaining digital signature and public key cryptosystems. Communications of the ACM, 21:120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest1
  • 24
    • 0004099837 scopus 로고
    • O'Reilly & Associates, Inc. 1992
    • Rosenberry, 1992. Understanding DCE. O'Reilly & Associates, Inc., 1992.
    • (1992) Understanding DCE
    • Rosenberry1
  • 25
    • 0018545449 scopus 로고
    • How to share a secret
    • 1979
    • Shamir, 1979. How to share a secret. Communication of the ACM, 22(11):612-613, 1979.
    • (1979) Communication of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.