Seventh IEEE International Conference on E-Commerce Technology (CEC'05)
DOI: 10.1109/icect.2005.9
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases: Protection against External and Internal Attacks on Databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Reference [5] considers primarily management of secret keys for database encryption. The solution closest to the ideas from this paper is described in [6]. The author describes use of cryptography at different database levels, use of combined secret key and public key cryptography, and user authentication based on several alternative protocols.…”
Section: Internet Security Problemsmentioning
confidence: 99%
“…Reference [5] considers primarily management of secret keys for database encryption. The solution closest to the ideas from this paper is described in [6]. The author describes use of cryptography at different database levels, use of combined secret key and public key cryptography, and user authentication based on several alternative protocols.…”
Section: Internet Security Problemsmentioning
confidence: 99%
“…,..., ,..., 1 (1) Columns from A 1 to A m need to be encrypted. The corresponding encrypted relation is as follows:…”
Section: A Storage Modelmentioning
confidence: 99%
“…Thefts maybe steal physical hard disks to get critical data; Hackers may bypass the access control mechanism of database; malicious DBA use super privilege to compromise the database [1].…”
Section: Introductionmentioning
confidence: 99%
“…Various possibilities of data theft can occur when carrying out a particular project such as database server migration, cloning activities on data le storage, natural disasters that may arise, or when trying to retrieve existing data le storage [4]. Hence, the database's security is essential as data is one of the most valuable assets owned and cannot be disclosed by anyone [5] According to research conducted by Hammouchi [6], from January 2005 to December 2018, the Privacy Rights Clearinghouse (PRC) has recorded more than 9,000 hacking cases containing 12 billion data with many instances. "Each breach can be caused by an insider that intentionally breaches information (INSD), payment card fraud (CARD), physical loss (PHYS), lost or stolen portable device (PORT), being hacked by someone or infected by malware (HACK), stationary equipment loss (STAT), an unknown method (UNKN) or an unintended disclosure like sending an email to the wrong person (DISC)" [6].…”
Section: Introductionmentioning
confidence: 99%