Encrypting databases for confidentiality

dc.authoridTR102382en_US
dc.authoridTR52295en_US
dc.contributor.authorTaşseven, Özlem
dc.contributor.authorElifoğlu, Hilmi
dc.contributor.authorDalkılıç, Nilüfer
dc.date.accessioned2016-11-25T08:54:02Z
dc.date.available2016-11-25T08:54:02Z
dc.date.issued2012
dc.departmentDoğuş Üniversitesi, İktisadi ve İdari Bilimler Fakültesi, Ekonomi ve Finans Bölümüen_US
dc.descriptionTaşseven, Özlem (Dogus Author) -- American Society of Business and Behavioral Sciences, Program of the 19th Annual Conference, February 23-26, Las Vegas, NV, USA.en_US
dc.description.abstractThe concept of enterprise information security is related to who is allowed to access information and what they can do (such as, read, write and execute privileges) with that information in various forms. Whatever the form the data is in, such as data in use, data in transit and data at rest, the restrictions on access should be considered before anything else. Confidentiality means keeping the right person in, and wrong person out. Unfortunately, there is no fool-proof mechanism to control against an unauthorized access when it comes to internal users with powerful privileges (such as, a system administrator or a database administrator (DBA)). Access to enterprise information must be planned and limited for a variety of users, whether external and internal, for a variety of reasons. Among these groups, internal users with powerful privileges are the most difficult to manage from an access point of view. Because of their jobs, these type of users will always have an easy access to any type of data in the system. Since there is no such thing as a foolproof access control for these type of users, in this paper we recommend the consideration of the data encryption as the second line of defense. Unfortunately, the encryption of a database as a whole creates additional performance issues. To avoid the performance related issues, the possibility of encrypting selected components of a database, such as rows, columns or even cells should be considered to protect the data from unauthorized accesses.en_US
dc.identifier.citationElifoglu, H., Taşseven Ö., & Dalkılıç, N. (2012). Encrypting databases for confidentiality. In American Society of Business and Behavioral Sciences, Program of the 19th Annual Conference, February 23-26, Las Vegas, NV, USA.en_US
dc.identifier.urihttps://hdl.handle.net/11376/2735
dc.institutionauthorTaşseven, Özlem
dc.language.isoenen_US
dc.relation.ispartofAmerican Society of Business and Behavioral Sciences, Program of the 19th Annual Conference, February 23-26, Las Vegasen_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectInformation Securityen_US
dc.subjectEncryptingen_US
dc.subjectData Encryptionen_US
dc.subjectDatabaseen_US
dc.titleEncrypting databases for confidentialityen_US
dc.typeConference Objecten_US

Dosyalar

Orijinal paket

Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
İsim:
otasseven_2012.pdf
Boyut:
111.9 KB
Biçim:
Adobe Portable Document Format
Açıklama:
Yazar Sürümü

Lisans paketi

Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
İsim:
license.txt
Boyut:
1.51 KB
Biçim:
Item-specific license agreed upon to submission
Açıklama: