Provable Security for Outsourcing Database Operations
نویسندگان
چکیده
منابع مشابه
Security Protocols for Outsourcing Database Services
Advances in networking technologies and the continued growth of the Internet have triggered a new trend towards outsourcing data management and information technology needs to external service providers. As a recent manifestation of this trend, there has been growing interest in outsourcing database services in both the commercial world and the research community. Although the outsourced databa...
متن کاملProvable Security for Physical Cryptography
The modern approach to cryptography is provable security, where one defines a meaningful formal security model and proves that schemes are secure in this model. An exception is the design of countermeasures against cryptographic sidechannel attacks, which even today is mostly based on heuristic arguments, which only try to prevent particular attacks. It was long believed that side-channels are ...
متن کاملProvable Security of Networks
We propose a security hypothesis that a network is secure, if any deliberate attacks of a small number of nodes will never generate a global failure of the network, and a robustness hypothesis that a network is robust, if a small number of random errors will never generate a global failure of the network. Based on these hypotheses, we propose a definition of security and a definition of robustn...
متن کاملAnalysis of Security Techniques Applied in Database Outsourcing
Database Outsourcing is a nascent data management paradigm in which the data owner stores the confidential data at the third party service provider’s site. The service provider is responsible for managing and administering the database and allows the data owner and clients to create, update, delete and access the database. There are chances of hampering the security of the data due to untrustwo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security and Privacy
سال: 2010
ISSN: 1930-1650,1930-1669
DOI: 10.4018/jisp.2010010101