+

Coles et al., 2009 - Google Patents

Expert SQL server 2008 encryption

Coles et al., 2009

Document ID
1868335932785447190
Author
Coles M
Landrum R
Jones S
Publication year

External Links

Snippet

Untitled Page 1 Page 2 i Expert SQL Server 2008 Encryption ■ ■ ■ Michael Coles and Rodney Landrum Page 3 Expert SQL Server 2008 Encryption Copyright © 2009 by Michael Coles and Rodney Landrum This work is subject to copyright. All rights are reserved by the …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores

Similar Documents

Publication Publication Date Title
US9514330B2 (en) Meta-complete data storage
CN103563325B (en) Systems and methods for securing data
US8494154B2 (en) Cryptographic ignition key system
CN112380557B (en) Relational database encryption method and encrypted database query method
CN102422590A (en) Protection of encryption keys in a database
CN104079573A (en) Systems and methods for securing data in the cloud
Bond Understanding Security APIs
Belenko et al. “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really?
Singh Network security and management
Biryukov Des-x (or desx)
Jones et al. Information security: A coordinated strategy to guarantee data security in cloud computing
Sako Digital signature schemes
CN105978680A (en) Implementing padding in a white-box implementation
Haunts Applied Cryptography in .NET and Azure Key Vault
CN103379133A (en) Safe and reliable cloud storage system
Videau Distinguishing attacks
Adams Dictionary Attack
Coles et al. Expert SQL server 2008 encryption
Rupa et al. Study and improved data storage in cloud computing using cryptography
Akbar et al. Study and improved data storage in cloud computing using cryptography
Desmedt Deniable Encryption
Shrivas et al. Migration Model for un secure Database driven Software System to Secure System using Cryptography
Coles et al. Introduction to Encryption
Gupta et al. An enhanced python based approach of secret sharing scheme with encryption
GBESOR-ZOIKU COLLEGE OF BASIC AND APPLIED SCIENCE DEPARTMENT OF COMPUTER SCIENCE
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载