The application of cryptography for data base security

Ehud Gudes, Harvey S. Koch, Fred A. Stahl

Research output: Contribution to conferencePaperpeer-review

6 Scopus citations

Abstract

The application of cryptographic transformations for the purpose of enhancing the security in data base systems is discussed. These transformations have been recognized in the past as a valuable protection mechanism but their relation to data base security has not been identified. The major reason is the lack of a suitable data base model for investigating the questions of security and cryptography. A multi-level model of a data base is presented in this paper. This model helps to understand the connection between the data base structure and the cryptographic transformations applied to the data base. It is shown that cryptographic transformations can be applied between the different levels of the data base. Several types of these transformations are identified and the possible ways of using and controlling them are also discussed. The multi-level model can provide a useful framework for further research in the area of cryptography and data base security.

Original languageEnglish
Pages97-107
Number of pages11
DOIs
StatePublished - 7 Jun 1976
Externally publishedYes
Event1976 American Federation of Information Processing Societies National Computer Conference, AFIPS 1976 - New York City, United States
Duration: 7 Jun 197610 Jun 1976

Conference

Conference1976 American Federation of Information Processing Societies National Computer Conference, AFIPS 1976
Country/TerritoryUnited States
CityNew York City
Period7/06/7610/06/76

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems
  • Software
  • Education

Fingerprint

Dive into the research topics of 'The application of cryptography for data base security'. Together they form a unique fingerprint.

Cite this