ACM SIGMOD Anthology TODS dblp.uni-trier.de

A Database Encryption System with Subkeys.

George I. Davida, David L. Wells, John B. Kam: A Database Encryption System with Subkeys. ACM Trans. Database Syst. 6(2): 312-328(1981)
@article{DBLP:journals/tods/DavidaWK81,
  author    = {George I. Davida and
               David L. Wells and
               John B. Kam},
  title     = {A Database Encryption System with Subkeys},
  journal   = {ACM Trans. Database Syst.},
  volume    = {6},
  number    = {2},
  year      = {1981},
  pages     = {312-328},
  ee        = {http://doi.acm.org/10.1145/319566.319580, db/journals/tods/DavidaWK81.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

A new cryptosystem that is suitable for database encryption is presented. The system has the important property of having subkeys that allow the encryption and decryption of fields within a record. The system is based on the Chinese Remainder Theorem.

Copyright © 1981 by the ACM, Inc., used by permission. Permission to make digital or hard copies is granted provided that copies are not made or distributed for profit or direct commercial advantage, and that copies show this notice on the first page or initial screen of a display along with the full citation.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

References

[1]
Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman: The Design and Analysis of Computer Algorithms. Addison-Wesley 1974, ISBN 0-201-00029-6
BibTeX
[2]
...
[3]
George I. Davida, David J. Linton, C. Russel Szelag, David L. Wells: Database Security. IEEE Trans. Software Eng. 4(6): 531-533(1978) BibTeX
[4]
...
[5]
...
[6]
...
[7]
...
[8]
John B. Kam, George I. Davida: Structured Design of Substitution-Permutation Encryption Networks. IEEE Trans. Computers 28(10): 747-753(1979) BibTeX
[9]
John B. Kam, Jeffrey D. Ullman: A Model of Statistical Databases and Their Security. ACM Trans. Database Syst. 2(1): 1-10(1977) BibTeX
[10]
...
[11]
...
[12]
...
[13]
...
[14]
Naftaly H. Minsky: Intentional Resolution of Privacy Protection in Database Systems. Commun. ACM 19(3): 148-159(1976) BibTeX
[15]
...
[16]
...
[17]
Ronald L. Rivest, Adi Shamir, Leonard M. Adleman: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM 21(2): 120-126(1978) BibTeX
[18]
...

Referenced by

  1. Thomas Hardjono, Jennifer Seberry: Search Key Substitution in the Encipherment of B-Trees. VLDB 1990: 50-58
  2. Joachim Biskup, Hans Hermann Brüggemann: The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). ICDE 1989: 348-355
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:46 2008