A novel encrypted database technique to develop a secure application for an academic institution

Syed S. Rizvi, Aasia Riasat, Mustafa A. Khan, Khaled M. Elleithy

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. The scope of this paper mainly includes but is not limited to symmetric and public-key cryptography, authentication, key management, and digital signatures. The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application. This paper presents the implementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively. In other words, it is self sufficient in terms of the data that it stores.

Original languageEnglish (US)
Title of host publicationNovel Algorithms and Techniques in Telecommunications and Networking
PublisherKluwer Academic Publishers
Pages293-298
Number of pages6
ISBN (Print)9789048136612
DOIs
StatePublished - 2010
Event2008 International Conference on Telecommunications and Networking, TeNe 2008, Part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2008 -
Duration: Dec 5 2008Dec 13 2008

Publication series

NameNovel Algorithms and Techniques in Telecommunications and Networking

Other

Other2008 International Conference on Telecommunications and Networking, TeNe 2008, Part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2008
Period12/5/0812/13/08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Communication

Fingerprint

Dive into the research topics of 'A novel encrypted database technique to develop a secure application for an academic institution'. Together they form a unique fingerprint.

Cite this