Results (1)
Search Parameters:
Author/Affiliation: Nassim KharmoumNew Solution Implementation to Protect Encryption Keys Inside the Database Management System
Advances in Science, Technology and Engineering Systems Journal,
Volume 5,
Issue 2,
Page # 87–94,
2020;
DOI: 10.25046/aj050211
Abstract:
Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…
Read More(This article belongs to Section Cybernetics in Computer Science (CCY))
