Flat role based access control and encryption scheme for database security
Encryption is one way that can be used to secure database. In the use of encryption to secure database it is important to determine where the location of encryption to be performed. In database encryption, one location to perform the encryption is in application level, where the data has been produc...
Saved in:
Main Author: | Al Farissi, Al Farissi |
---|---|
Format: | Thesis |
Published: |
2013
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
An index based searchable encryption scheme with IND-CCA security
by: Nateghizad, Majid
Published: (2014) -
Developing secure android application with encrypted database file using sqlcipher
by: Rachmawan, Ardiansa
Published: (2014) -
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
by: Yap, Wun She
Published: (2007) -
Design of new block and stream cipher encryption algorithms for data security
by: Tuan Mat @ Tuan Muhammad, Tuan Sabri
Published: (2000) -
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)