A data definition and mapping language
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
Concepts of a Data Independent Accessing Model
SIGFIDET '72 Proceedings of 1972 ACM-SIGFIDET workshop on Data description, access and control
On interaction with data bases
SIGFIDET '74 Proceedings of the 1974 ACM SIGFIDET (now SIGMOD) workshop on Data description, access and control
A model for data secure systems.
A model for data secure systems.
The application of cryptography to data base security.
The application of cryptography to data base security.
On the encipherment of search trees and random access files
VLDB '75 Proceedings of the 1st International Conference on Very Large Data Bases
System implications of information privacy
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
Cryptographic techniques for computers
AFIPS '69 (Spring) Proceedings of the May 14-16, 1969, spring joint computer conference
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
A consideration of the application of cryptographic techniques to data processing
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
The formulary model for flexible privacy and access controls
AFIPS '71 (Fall) Proceedings of the November 16-18, 1971, fall joint computer conference
Privacy transformations for databank systems
AFIPS '73 Proceedings of the June 4-8, 1973, national computer conference and exposition
Secrecy and privacy in the local area network environment
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
An overview of recent data base research
ACM SIGMIS Database
Hi-index | 0.00 |
The application of cryptographic transformations for the purpose of enhancing the security in data base systems is discussed. These transformations have been recognized in the past as a valuable protection mechanism but their relation to data base security has not been identified. The major reason is the lack of a suitable data base model for investigating the questions of security and cryptography. A multi-level model of a data base is presented in this paper. This model helps to understand the connection between the data base structure and the cryptographic transformations applied to the data base. It is shown that cryptographic transformations can be applied between the different levels of the data base. Several types of these transformations are identified and the possible ways of using and controlling them are also discussed. The multi-level model can provide a useful framework for further research in the area of cryptography and data base security.