Database Reference
In-Depth Information
59. H. E. H. Ahmed, H. M. Kalash, and O. S. Faragallah. 2007. Encryption
efficiency analysis and security evaluation of RC6 block cipher for digi-
tal images. International Conference on Electrical Engineering (ICEE '07),
1-7, April 11-12.
60. Min-A Jeong, Jung-Ja Kim, and Yonggwan Won. 2003. A flexible data-
base security system using multiple access control policies. Proceedings
of the 4th International Conference on Parallel and Distributed Computing,
Applications and Technologies , 236-240.
61. Bruce Benfield and Richard Swagerman. 2001. Encrypting data values
in DB2 universal database. Available at http://www.ibm.com/devel-
operworks/data/library/techarticle/benfield/0108benfield.html (accessed
March 2011).
62. Transparent data encryption. Available at http://docs.oracle.com/cd/
B19306_01/network.102/b14268/asotrans.htm (accessed July 2011).
63. Worawit Meanrach and Suphamit Chittayasothorn. 2007. A bitempo-
ral multilevel secure database system. Proceedings of IEEE African 2007
Conference , 1-7.
64. Art Rask, Don Rubin, and Bill Neumann. 2005. Implementing row-
and cell-level security in classified databases using SQL server. 2005.
Available at http://technet.microsoft.com/en-us/library/cc966395.aspx
(accessed April 2011).
65. Yuval Elovici, Ronen Waisenberg, Eras Shmueli, and Ehud Gudes.
2004. A structure preserving database encryption scheme. Proceedings of
International Conference SDM , 28-40.
66. Xiao-Dong Zuo, Feng-Mai Liu, and Chao-Bin Ma. 2007. A new
approach to multilevel security based on trusted computing platform.
Proceedings of the Sixth International Conference on Machine Learning and
Cybernetics, Hong Kong, 2158-2163.
67. Navdeep Kaur, Rajwinder Singh, and H. S. Saini. 2009. Design and
analysis of secure scheduler for MLS distributed database systems.
Proceedings of IEEE International Advance Computing Conference (IACC
2009) Patiala, India, 1400-1404.
68. Ramzi Haraty and Natalie Bekaii. 2006. Towards a temporal multilevel
secure database (TMSDB). Journal of Computer Science 2 (1): 19-28.
69. Pinal Dave. 2008. Introduction to SQL server encryption and symmetric
key encryption tutorial. Available at http://dotnetslackers.com/articles/
sql/IntroductionToSQLServerEncryptionAndSymmetric KeyEncryption
Tutorial.aspx (accessed May 2011).
70. Moses Garuba. 2003. Performance study of a cots distributed DBMS
adapted for multilevel security. PhD thesis, Department of Mathematics,
Royal Holloway, University of London, Egham, Surrey. Available at
http://digirep.rhul.ac.uk/items/f076f347-2036-6bd0-98c8-e1d2dc-
9cf4ab/1/ (accessed April 2011).
71. Moses Garuba, Edward Appiah, and Legand Burge. 2004. Performance
study of a MLS/DBMS implemented as a kernelized architecture.
Proceedings of the International Conference on Information Technology:
Coding and Computing (ITCC'04), 566-570.
Search WWH ::




Custom Search