Guo, 2011 - Google Patents
Fragile watermarking scheme for tamper detection of relational databaseGuo, 2011
- Document ID
- 5314816041302934810
- Author
- Guo J
- Publication year
- Publication venue
- 2011 International Conference on Computer and Management (CAMAN)
External Links
Snippet
As more and more databases are published on the internet nowadays, it is increasingly important to maintain the security of published databases. In this paper, we propose a distortion-free scheme for embedding and verifying integrity information for relational …
- 238000001514 detection method 0 title description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Guo | Fragile watermarking scheme for tamper detection of relational database | |
US8225402B1 (en) | Anomaly-based detection of SQL injection attacks | |
Guo et al. | A fragile watermarking scheme for detecting malicious modifications of database relations | |
US20170053135A1 (en) | Columnar Table Data Protection | |
Kamel | A schema for protecting the integrity of databases | |
Camara et al. | Distortion‐free watermarking approach for relational database integrity checking | |
CN101587479A (en) | Database management system kernel oriented data encryption/decryption system and method thereof | |
Rani et al. | Tampering detection of distributed databases using blockchain technology | |
Iftikhar et al. | A survey on reversible watermarking techniques for relational databases | |
Dubey et al. | SQL filtering: An effective technique to prevent SQL injection attack | |
Kamel et al. | Toward protecting the integrity of relational databases | |
Yu | [Retracted] Encryption Technology for Computer Network Data Security Protection | |
Siledar et al. | A distortion-free watermarking approach for verifying integrity of relational databases | |
Hong et al. | Query integrity verification based-on mac chain in cloud storage | |
US20230205896A1 (en) | Methods for securing data | |
Li et al. | An asymmetric watermarking scheme for relational database | |
Ge et al. | Reversible database watermarking based on random forest and genetic algorithm | |
Dwivedi et al. | Watermarking techniques for ownership protection of relational databases | |
Camara et al. | Block-based scheme for database integrity verification | |
Silvério et al. | Efficient data integrity checking for untrusted database systems | |
Ravan et al. | A survey on querying encrypted data for database as a service | |
KR102108542B1 (en) | Security method for video metadata and method for searching encrypted video using the same | |
Bhattacharya et al. | Distortion-Free Authentication Watermarking. | |
Khanduja | Dynamic watermark injection in NoSQL databases | |
Kamel et al. | An empirical study on the robustness of a fragile watermark for relational databases |