A practical implementation of transparent encryption and separation of duties in enterprise databases: protection against external and internal attacks on databases
暂无分享,去创建一个
[1] Alan O. Freier,et al. SSL Protocol Version 3.0 Internet Draft , 1996 .
[2] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[3] Ward Rosenberry,et al. Understanding DCE , 1992 .
[4] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[5] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Wolfgang Rankl,et al. Smart Card Handbook , 1997 .
[9] Ramakrishnan Srikant,et al. Implementing P3P using database technology , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[10] Sean W. Smith,et al. Improving DES hardware throughput for short operations , 2000 .
[11] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[12] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[13] Scott B. Guthery,et al. Smart Card Developer's Kit , 1998 .
[14] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[15] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[16] Ramakrishnan Srikant,et al. An XPath-based preference language for P3P , 2003, WWW '03.
[17] S. Garfinkel,et al. Web security & commerce , 1997 .
[18] Ramakrishnan Srikant,et al. Hippocratic Databases , 2002, VLDB.
[19] Rakesh Agrawal,et al. Watermarking Relational Databases , 2002, Very Large Data Bases Conference.
[20] Kevin Loney,et al. Oracle8: The Complete Reference , 1997 .
[21] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.