Database Encryption

  title={Database Encryption},
  author={Luc Bouganim and Yanli Guo},
  booktitle={Encyclopedia of Cryptography and Security},
Database security encompasses three main properties: confidentiality, integrity and availability. Roughly speaking, the confidentiality property enforces predefined restrictions while accessing the protected data, thus preventing disclosure to unauthorized persons. The integrity property guarantees that the data cannot be corrupted in an invisible way. Finally, the availability property ensures timely and reliable access to the database. 
Highly Cited
This paper has 18 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 14 extracted citations

A Security Novel for a Networked Database

2014 International Conference on Computational Science and Computational Intelligence • 2014
View 17 Excerpts
Highly Influenced

Database Encryption Using Asymmetric Keys: A Case Study

2017 21st International Conference on Control Systems and Computer Science (CSCS) • 2017
View 1 Excerpt

Application Layer Encryption for Cloud

2015 Asia-Pacific Software Engineering Conference (APSEC) • 2015
View 1 Excerpt

Data Integrity Evaluation in Cloud Database-as-a-Service

2013 IEEE Ninth World Congress on Services • 2013
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 14 references

Database Encryption in SQL Server 2008 Enterprise Edition, SQL Server

Sung Hsueh
Technical Article, • 2008
View 5 Excerpts
Highly Influenced

Transparent Encryption and Separation of Duties for Enterprise Databases: A practical implementation for Field Level Privacy in Databases, Protegrity

U. Mattsson
Technical Paper, • 2004
View 3 Excerpts
Highly Influenced

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

2007 IEEE 23rd International Conference on Data Engineering • 2007
View 2 Excerpts

Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases

22nd International Conference on Data Engineering Workshops (ICDEW'06) • 2006
View 2 Excerpts

Chung and Gultekin Ozsoyoglu , Antitamper databases : Processing aggregate queries over encrypted databases

S. Sun

Similar Papers

Loading similar papers…