Database encryption

Results: 73



#Item
31Microsoft Word - sigmod038-markowetz.doc

Microsoft Word - sigmod038-markowetz.doc

Add to Reading List

Source URL: www.iai.uni-bonn.de

Language: English - Date: 2007-03-10 05:32:06
32White Paper Debunking The Myths of Column-level Encryption Debunking The Myths of Column-level

White Paper Debunking The Myths of Column-level Encryption Debunking The Myths of Column-level

Add to Reading List

Source URL: cybersec.fi

Language: English - Date: 2012-10-07 15:21:18
33Secure and Efficient In-Network Processing of Exact SUM Queries Stavros Papadopoulos 1 , Aggelos Kiayias 2 , Dimitris Papadias 3 1  Department of Computer Science and Engineering

Secure and Efficient In-Network Processing of Exact SUM Queries Stavros Papadopoulos 1 , Aggelos Kiayias 2 , Dimitris Papadias 3 1 Department of Computer Science and Engineering

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:45
34Database TDE Most/All Sensitive File Encryption  Existing

Database TDE Most/All Sensitive File Encryption Existing

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2015-02-25 15:15:07
3532700_ref-architecture_0911_levels_4C

32700_ref-architecture_0911_levels_4C

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:04
36Secure Computation on Encrypted Database Faculty Seminar, MayProfessor David Wai-lok CHEUNG Head, Department of Computer Science

Secure Computation on Encrypted Database Faculty Seminar, MayProfessor David Wai-lok CHEUNG Head, Department of Computer Science

Add to Reading List

Source URL: engg.hku.hk

Language: English - Date: 2009-06-26 21:59:31
37Oracle Database 2 Day + Security Guide

Oracle Database 2 Day + Security Guide

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-02-08 22:19:44
38Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms Alexander Kornbrust 28-July-2005

Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms Alexander Kornbrust 28-July-2005

Add to Reading List

Source URL: www.red-database-security.com

Language: English - Date: 2009-05-07 08:02:06
39TrustWay box, the best suitable HSM for Oracle database security The TrustWay box, HSM for Oracle database encryption, has been certified with Transparent Data Encryption, the component of the Oracle Advanced Security Op

TrustWay box, the best suitable HSM for Oracle database security The TrustWay box, HSM for Oracle database encryption, has been certified with Transparent Data Encryption, the component of the Oracle Advanced Security Op

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-12-03 08:32:10
40• Media Independence: In addition to disk, Assureon supports offline media such as tape and optical allowing user’s to benefit not only from the high level of security provided by the encryption on their tapes, but a

• Media Independence: In addition to disk, Assureon supports offline media such as tape and optical allowing user’s to benefit not only from the high level of security provided by the encryption on their tapes, but a

Add to Reading List

Source URL: www.abcsystems.ch

Language: English - Date: 2008-10-09 08:32:55