Holistic Database Encryption
Walid Rjaibi
2018
Abstract
Encryption is a key technical control for safeguarding sensitive data against internal and external threats. It is also a requirement for complying with several industry standards and government regulations. While Transport Layer Security (TLS) is widely accepted as the standard solution for encrypting data in transit, no single solution has achieved similar status for encrypting data at rest. This is particularly true for database encryption where current approaches are forcing organizations to compromise either on the security side or on the database side. In this paper, we discuss the design and implementation of a holistic database encryption approach which allows organizations to meet their security and compliance requirements without having to sacrifice any critical database or security properties.
DownloadPaper Citation
in Harvard Style
Rjaibi W. (2018). Holistic Database Encryption.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT, ISBN 978-989-758-319-3, pages 472-477. DOI: 10.5220/0006833604720477
in Bibtex Style
@conference{secrypt18,
author={Walid Rjaibi},
title={Holistic Database Encryption},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,},
year={2018},
pages={472-477},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006833604720477},
isbn={978-989-758-319-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,
TI - Holistic Database Encryption
SN - 978-989-758-319-3
AU - Rjaibi W.
PY - 2018
SP - 472
EP - 477
DO - 10.5220/0006833604720477