Database Value

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 122706 Experts worldwide ranked by ideXlab platform

Yuval Elovici - One of the best experts on this subject based on the ideXlab platform.

  • implementing a Database encryption solution design and implementation issues
    Computers & Security, 2014
    Co-Authors: Erez Shmueli, Ehud Gudes, Ronen Vaisenberg, Yuval Elovici
    Abstract:

    Abstract In this paper, we analyze and compare five traditional architectures for Database encryption. We show that existing architectures may provide a high level of security, but have a significant impact on performance and impose major changes to the application layer, or may be transparent to the application layer and provide high performance, but have several fundamental security weaknesses. We suggest a sixth novel architecture that was not considered before. The new architecture is based on placing the encryption module inside the Database management software (DBMS), just above the Database cache, and using a dedicated technique to encrypt each Database Value together with its coordinates. These two properties allow our new architecture to achieve a high level of data security while offering enhanced performance and total transparency to the application layer. We also explain how each architecture can be implemented in a commercial, open source DBMS. We evaluate the performance of the various architectures both analytically and through extensive experimentation. Our performance evaluation results demonstrate that in most realistic scenarios, i.e., where only a part of the Database content is stored in the Database cache, the suggested architecture outperforms the others.

Erez Shmueli - One of the best experts on this subject based on the ideXlab platform.

  • implementing a Database encryption solution design and implementation issues
    Computers & Security, 2014
    Co-Authors: Erez Shmueli, Ehud Gudes, Ronen Vaisenberg, Yuval Elovici
    Abstract:

    Abstract In this paper, we analyze and compare five traditional architectures for Database encryption. We show that existing architectures may provide a high level of security, but have a significant impact on performance and impose major changes to the application layer, or may be transparent to the application layer and provide high performance, but have several fundamental security weaknesses. We suggest a sixth novel architecture that was not considered before. The new architecture is based on placing the encryption module inside the Database management software (DBMS), just above the Database cache, and using a dedicated technique to encrypt each Database Value together with its coordinates. These two properties allow our new architecture to achieve a high level of data security while offering enhanced performance and total transparency to the application layer. We also explain how each architecture can be implemented in a commercial, open source DBMS. We evaluate the performance of the various architectures both analytically and through extensive experimentation. Our performance evaluation results demonstrate that in most realistic scenarios, i.e., where only a part of the Database content is stored in the Database cache, the suggested architecture outperforms the others.

Rachel Pryor - One of the best experts on this subject based on the ideXlab platform.

  • toxicities of oils dispersants and dispersed oils to algae and aquatic plants review and Database Value to resource sustainability
    Environmental Pollution, 2013
    Co-Authors: Michael A Lewis, Rachel Pryor
    Abstract:

    Phytotoxicity results are reviewed for oils, dispersants and dispersed oils. The phytotoxicity Database consists largely of results from a patchwork of reactive research conducted after oil spills to marine waters. Toxicity information is available for at least 41 crude oils and 56 dispersants. As many as 107 response parameters have been monitored for 85 species of unicellular and multicellular algae, 28 wetland plants, 13 mangroves and 9 seagrasses. Effect concentrations have varied by as much as six orders of magnitude due to experimental diversity. This diversity restricts phytotoxicity predictions and identification of sensitive species, life stages and response parameters. As a result, evidence-based risk assessments for most aquatic plants and petrochemicals and dispersants are not supported by the current toxicity Database. A proactive and experimentally-consistent approach is recommended to provide threshold toxic effect concentrations for sensitive life stages of aquatic plants inhabiting diverse ecosystems.

Ehud Gudes - One of the best experts on this subject based on the ideXlab platform.

  • implementing a Database encryption solution design and implementation issues
    Computers & Security, 2014
    Co-Authors: Erez Shmueli, Ehud Gudes, Ronen Vaisenberg, Yuval Elovici
    Abstract:

    Abstract In this paper, we analyze and compare five traditional architectures for Database encryption. We show that existing architectures may provide a high level of security, but have a significant impact on performance and impose major changes to the application layer, or may be transparent to the application layer and provide high performance, but have several fundamental security weaknesses. We suggest a sixth novel architecture that was not considered before. The new architecture is based on placing the encryption module inside the Database management software (DBMS), just above the Database cache, and using a dedicated technique to encrypt each Database Value together with its coordinates. These two properties allow our new architecture to achieve a high level of data security while offering enhanced performance and total transparency to the application layer. We also explain how each architecture can be implemented in a commercial, open source DBMS. We evaluate the performance of the various architectures both analytically and through extensive experimentation. Our performance evaluation results demonstrate that in most realistic scenarios, i.e., where only a part of the Database content is stored in the Database cache, the suggested architecture outperforms the others.

Ronen Vaisenberg - One of the best experts on this subject based on the ideXlab platform.

  • implementing a Database encryption solution design and implementation issues
    Computers & Security, 2014
    Co-Authors: Erez Shmueli, Ehud Gudes, Ronen Vaisenberg, Yuval Elovici
    Abstract:

    Abstract In this paper, we analyze and compare five traditional architectures for Database encryption. We show that existing architectures may provide a high level of security, but have a significant impact on performance and impose major changes to the application layer, or may be transparent to the application layer and provide high performance, but have several fundamental security weaknesses. We suggest a sixth novel architecture that was not considered before. The new architecture is based on placing the encryption module inside the Database management software (DBMS), just above the Database cache, and using a dedicated technique to encrypt each Database Value together with its coordinates. These two properties allow our new architecture to achieve a high level of data security while offering enhanced performance and total transparency to the application layer. We also explain how each architecture can be implemented in a commercial, open source DBMS. We evaluate the performance of the various architectures both analytically and through extensive experimentation. Our performance evaluation results demonstrate that in most realistic scenarios, i.e., where only a part of the Database content is stored in the Database cache, the suggested architecture outperforms the others.