Flat role based access control and encryption scheme for database security
Encryption is one way that can be used to secure database. In the use of encryption to secure database it is important to determine where the location of encryption to be performed. In database encryption, one location to perform the encryption is in application level, where the data has been produc...
محفوظ في:
المؤلف الرئيسي: | Al Farissi, Al Farissi |
---|---|
التنسيق: | أطروحة |
منشور في: |
2013
|
الموضوعات: | |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
مواد مشابهة
-
An index based searchable encryption scheme with IND-CCA security
بواسطة: Nateghizad, Majid
منشور في: (2014) -
Developing secure android application with encrypted database file using sqlcipher
بواسطة: Rachmawan, Ardiansa
منشور في: (2014) -
Design And Cryptanalysis Of Encryption And Signature Schemes Without Certificates
بواسطة: Yap, Wun She
منشور في: (2007) -
Design of new block and stream cipher encryption algorithms for data security
بواسطة: Tuan Mat @ Tuan Muhammad, Tuan Sabri
منشور في: (2000) -
A press touch code based secure graphical password scheme for smart devices
بواسطة: Al Noman Ranak, Md Sayfullah
منشور في: (2018)