The application of cryptography for data base security

  • Authors:
  • Ehud Gudes;Harvey S. Koch;Fred A. Stahl

  • Affiliations:
  • The Ohio State University, Columbus, Ohio;The Ohio State University, Columbus, Ohio;Columbia University, New York, New York

  • Venue:
  • AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
  • Year:
  • 1976

Quantified Score

Hi-index 0.00

Visualization

Abstract

The application of cryptographic transformations for the purpose of enhancing the security in data base systems is discussed. These transformations have been recognized in the past as a valuable protection mechanism but their relation to data base security has not been identified. The major reason is the lack of a suitable data base model for investigating the questions of security and cryptography. A multi-level model of a data base is presented in this paper. This model helps to understand the connection between the data base structure and the cryptographic transformations applied to the data base. It is shown that cryptographic transformations can be applied between the different levels of the data base. Several types of these transformations are identified and the possible ways of using and controlling them are also discussed. The multi-level model can provide a useful framework for further research in the area of cryptography and data base security.