Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing

Simin Ghasemi; Mohammad Ali Hadavi; Mina Niknafs

Volume 11, Issue 1 , January 2019, , Pages 3-14

https://doi.org/10.22042/isecure.2018.141655.426

Abstract
  Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification ...  Read More

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

M. Doroudian; H. R. Shahriari

Volume 6, Issue 2 , July 2014, , Pages 155-167

https://doi.org/10.22042/isecure.2015.6.2.5

Abstract
  Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases ...  Read More

Separating indexes from data: a distributed scheme for secure database outsourcing

S. Soltani; M. A. Hadavi; R. Jalili

Volume 3, Issue 2 , July 2011, , Pages 121-133

https://doi.org/10.22042/isecure.2015.3.2.5

Abstract
  Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares ...  Read More