k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Countering code-injection attacks with instruction-set randomization
Proceedings of the 10th ACM conference on Computer and communications security
Randomized instruction set emulation to disrupt binary code injection attacks
Proceedings of the 10th ACM conference on Computer and communications security
Obfuscation of executable code to improve resistance to static disassembly
Proceedings of the 10th ACM conference on Computer and communications security
Preserving Privacy in On-Line Analytical Processing (OLAP) (Advances in Information Security)
Preserving Privacy in On-Line Analytical Processing (OLAP) (Advances in Information Security)
Proceedings of the 2008 C3S2E conference
Towards Security Hardening of Scientific Demand-Driven and Pipelined Distributed Computing Systems
ISPDC '08 Proceedings of the 2008 International Symposium on Parallel and Distributed Computing
Self-Forensics Through Case Studies of Small-to-Medium Software Systems
IMF '09 Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics
Proceedings of the 2008 C3S2E conference
Hi-index | 0.00 |
This work presents a simple key management scheme for dynamic SQL randomization based on the approach of the SNMPv3 key generation. The original SQL randomization technique based on keyed randomization proxies lacks a mechanism for managing and updating cryptographic keys, which renders the technique vulnerable to the exposure or theft of the keys. Our scheme provides a practical solution to remove such a weakness in the SQL randomization technique. The idea was conceived during the course of implementation of the Java Data Security Framework (JDSF) as a part of a database security and privacy project.