Cryptography and Relational Database Management Systems

نویسندگان

  • He Jingmin
  • Min Wang
چکیده

Security is becoming one of the most urgent challenges in database research and industry, and the challenge is intensifying due to the enormous popularity of e-business. In this paper we study database security from a cryptographic point of view. We show how to integrate modern cryptography technology into a relational database management system to solve some major security problems. Our study shows that cryptographic support is an indispensable ingredient for a modern RDBMS to provide a secure environment for storing and processing huge amount of business data.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Object-Relational Database Containing Multimedia Data

This work describes the development of an information system to the consultation of specific Criminal Expert’s Reports based on multimedia database. These reports contain text, image, audio and video information. This Database Management System (DBMS) is based on object-relational (O-R) model. This kind of DBMS is an evolution of relational and object-oriented databases, being appropriate for m...

متن کامل

Policies Based Intrusion Response System for DBMS

Intrusion detection systems play an important role in detecting online intrusions and provide necessary alerts. Intrusion detection can also be done for relational databases. Intrusion response system for a relational database is essential to protect it from external and internal attacks. We propose a new intrusion response system for relational databases based on the database response policies...

متن کامل

A Database Encryption Solution That Is Protecting against ..

Security is becoming one of the most urgent challenges in database research and industry, and there has also been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. Instead of building walls around servers or hard drives, a protective layer of encryption is provided around specific sensitiv...

متن کامل

A two-phase encryption scheme for enhancing database security

In this article, we propose a two-phase encryption algorithm for data base systems. The system, a record-oriented cryptosystem, allows the encryption and decryption of fields within a record by means of writing and reading subkeys of fields. In addition, we develop two algorithms for cryptographic relational algebra in data base systems. Two simple methods of solving the key management problem ...

متن کامل

ON A LOSSY IMAGE COMPRESSION/RECONSTRUCTION METHOD BASED ON FUZZY RELATIONAL EQUATIONS

The pioneer work of image compression/reconstruction based onfuzzy relational equations (ICF) and the related works are introduced. TheICF regards an original image as a fuzzy relation by embedding the brightnesslevel into [0,1]. The compression/reconstruction of ICF correspond to thecomposition/solving inverse problem formulated on fuzzy relational equations.Optimizations of ICF can be consequ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001