Coles et al., 2009 - Google Patents
Expert SQL server 2008 encryptionColes et al., 2009
- Document ID
- 1868335932785447190
- Author
- Coles M
- Landrum R
- Jones S
- Publication year
External Links
Snippet
Untitled Page 1 Page 2 i Expert SQL Server 2008 Encryption ■ ■ ■ Michael Coles and
Rodney Landrum Page 3 Expert SQL Server 2008 Encryption Copyright © 2009 by Michael
Coles and Rodney Landrum This work is subject to copyright. All rights are reserved by the …
- 230000002633 protecting 0 description 57
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9514330B2 (en) | Meta-complete data storage | |
CN103563325B (en) | Systems and methods for securing data | |
US8494154B2 (en) | Cryptographic ignition key system | |
CN112380557B (en) | Relational database encryption method and encrypted database query method | |
CN102422590A (en) | Protection of encryption keys in a database | |
CN104079573A (en) | Systems and methods for securing data in the cloud | |
Bond | Understanding Security APIs | |
Belenko et al. | “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really? | |
Singh | Network security and management | |
Biryukov | Des-x (or desx) | |
Jones et al. | Information security: A coordinated strategy to guarantee data security in cloud computing | |
Sako | Digital signature schemes | |
CN105978680A (en) | Implementing padding in a white-box implementation | |
Haunts | Applied Cryptography in .NET and Azure Key Vault | |
CN103379133A (en) | Safe and reliable cloud storage system | |
Videau | Distinguishing attacks | |
Adams | Dictionary Attack | |
Coles et al. | Expert SQL server 2008 encryption | |
Rupa et al. | Study and improved data storage in cloud computing using cryptography | |
Akbar et al. | Study and improved data storage in cloud computing using cryptography | |
Desmedt | Deniable Encryption | |
Shrivas et al. | Migration Model for un secure Database driven Software System to Secure System using Cryptography | |
Coles et al. | Introduction to Encryption | |
Gupta et al. | An enhanced python based approach of secret sharing scheme with encryption | |
GBESOR-ZOIKU | COLLEGE OF BASIC AND APPLIED SCIENCE DEPARTMENT OF COMPUTER SCIENCE |