2008 International Conference on Information Networking 2008
DOI: 10.1109/icoin.2008.4472789
|View full text |Cite
|
Sign up to set email alerts
|

A Bucket ID Transformation Scheme for Efficient Database Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…The proposed framework is very useful in strengthening the protection of sensitive data even if the database server is attacked at multiple points from the inside or outside. There are also different researches that have been targeted on implementing cryptography algorithms for securing database as presented in [13,14,15,16]. There are different policies have been presented for securing database.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed framework is very useful in strengthening the protection of sensitive data even if the database server is attacked at multiple points from the inside or outside. There are also different researches that have been targeted on implementing cryptography algorithms for securing database as presented in [13,14,15,16]. There are different policies have been presented for securing database.…”
Section: Related Workmentioning
confidence: 99%