Holistic Database Encryption

Walid Rjaibi

2018

Abstract

Encryption is a key technical control for safeguarding sensitive data against internal and external threats. It is also a requirement for complying with several industry standards and government regulations. While Transport Layer Security (TLS) is widely accepted as the standard solution for encrypting data in transit, no single solution has achieved similar status for encrypting data at rest. This is particularly true for database encryption where current approaches are forcing organizations to compromise either on the security side or on the database side. In this paper, we discuss the design and implementation of a holistic database encryption approach which allows organizations to meet their security and compliance requirements without having to sacrifice any critical database or security properties.

Download


Paper Citation


in Harvard Style

Rjaibi W. (2018). Holistic Database Encryption.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT, ISBN 978-989-758-319-3, pages 472-477. DOI: 10.5220/0006833604720477


in Bibtex Style

@conference{secrypt18,
author={Walid Rjaibi},
title={Holistic Database Encryption},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,},
year={2018},
pages={472-477},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006833604720477},
isbn={978-989-758-319-3},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,
TI - Holistic Database Encryption
SN - 978-989-758-319-3
AU - Rjaibi W.
PY - 2018
SP - 472
EP - 477
DO - 10.5220/0006833604720477