Secure Distributed Databases Using Cryptography

Article English OPEN
Ion IVAN ; Cristian TOMA (2006)
  • Publisher: Inforec Association
  • Journal: Informatică economică, volume X, issue 3, pages 25-29 (issn: 1453-1305, eissn: 1842-8088)
  • Subject: databases | Computer engineering. Computer hardware | digital signature | encryption | databases, encryption, cryptography, digital signature | cryptography | Z | TK7885-7895 | Bibliography. Library science. Information resources

The computational encryption is used intensively by different databases management systems for ensuring privacy and integrity of information that are physically stored in files. Also, the information is sent over network and is replicated on different distributed system... View more
  • References (7)

    [1] J. He and M. Wang. Encryption in relational database management systems. In Proc. Fourteenth Annual IFIP WG 11.3 Working Conference on Database Security (DBSec'00), Schoorl, The Netherlands, 2000.

    [2] R.Agrawal,J.Kiernan,R.Srikant,and Y.Xu. An XPath-based preference language for P3P. In Proc. of the 12th Int'l World Wide Web Conference, Budapest, Hungary, May 2003.

    [3] S. Muchnick. Advanced Compiler Design and Implementation. Morgan Kaufmann Publishers, 1997.

    [4] N. R. Adam and J. C. Wortman. Securitycontrol methods for statistical databases. ACMComputing Surveys, 21(4):515- 556, Dec. 1989.

    [5] R. Agrawal and J. Kiernan. Watermarking relational databases. In 28th Int'l Conference on Very Large Databases, Hong Kong, China, August 2002.

    [6] R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In Proc. of the 28th Int'l Conference on Very Large Databases, Hong Kong, China, August 2002.

    [7] Agrawal, J.Kiernan,R.Srikant,andY.Xu.Implementing P3P using database technology. In Proc. of the 19th Int'l Conference on Data Engineering, Bangalore, India, March 2003.

  • Metrics
    No metrics available
Share - Bookmark