Database encryption

Results: 73



#Item
21ID-based encryption / Public-key cryptography / Database audit / Key / Computer data logging / Cipher / Proxy server / Cryptography / Computer security / Security

Building an Encrypted and Searchable Audit Log Brent R. Waters1∗, Dirk Balfanz2, Glenn Durfee2, and D. K. Smetters2 1 Princeton University Computer Science Department

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:31
22Indexing / Search engine indexing / Searching / Web search engine / Database / Extensible Storage Engine / XTR / Advantage / Information science / Information / Information retrieval

Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud † Faculty Chang Liu† , Liehuang Zhu‡ , and Jinjun Chen† ,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 04:09:39
23Computing / Password / European Insurance and Occupational Pensions Authority / FreeOTFE / On-the-fly encryption / Email / Database / System software / Cryptographic software / Disk encryption / Software

CEIOPS-QIS5November 2010 Process for analysing group data in QIS5 - main characteristics -

Add to Reading List

Source URL: eiopa.europa.eu

Language: English - Date: 2015-05-04 10:37:08
24Cloud infrastructure / Computer storage / Data security / Cloud storage / Backup / Storage area network / Disk encryption / Database / Converged storage / Cloud computing / Computing / Centralized computing

Defending Cloud Data with Infrastructure Encryption Version 1.0 Released: July 12, 2013

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2013-07-22 15:54:06
25Cyberwarfare / McAfee / Data loss prevention software / USB flash drive / Database activity monitoring / Disk encryption / Threat / Encryption / Database / Computer security / Computer network security / Security

32700_ref-architecture_0911_levels_4C

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:04
26Data / NTFS / Backup / Universal Serial Bus / Telecommunications data retention / Database / Classified information / Encryption / Information security / Information / Computing / Data security

Data Security Policy 1. Document Status Security Classification Level 4 - PUBLIC

Add to Reading List

Source URL: www.ioe.ac.uk

Language: English - Date: 2015-05-05 02:08:53
27Special purpose file systems / Public-key cryptography / Filesystem-level encryption / Encryption / Data security / Database security / Vormetric / Disk encryption hardware / Cryptography / Disk encryption / Cryptographic software

Understanding and Selecting a Database Encryption or Tokenization Solution Securosis, L.L.C.

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:12
28Throughput / RSA / Database / Cipher / Cryptography / Homomorphic encryption / Private information retrieval

XPIR : Private Information Retrieval for Everyone Carlos Aguilar-Melchor XLIM laboratory, Universit´e de Limoges, 123, av. Albert Thomas, 87060 Limoges Cedex, France Joris Barrier LAAS-CNRS laboratory, 7 Avenue du Colon

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-23 14:08:04
29Cyberwarfare / McAfee / Data loss prevention software / USB flash drive / Database activity monitoring / Disk encryption / Threat / Encryption / Database / Computer security / Computer network security / Security

32700_ref-architecture_0911_levels_4C

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:04
30Privacy / Database / Information / Ethics / Internet privacy / Data quality

Information Matching Bulletin News from the Office of the Privacy Commissioner – June 2008 In this edition Encryption required for physical transfer of data using digital media End of year s.104 reporting Technical Sta

Add to Reading List

Source URL: privacy.org.nz

Language: English - Date: 2014-09-24 22:15:00
UPDATE