Scholarworks Repository

An enterprise policy-based security protocol for protecting relational database network objects

Show simple item record

dc.contributor.author Itani W.
dc.contributor.author Kayssi A.
dc.contributor.author Chehab A.
dc.contributor.editor
dc.date 2006
dc.date.accessioned 2017-09-07T07:07:13Z
dc.date.available 2017-09-07T07:07:13Z
dc.date.issued 2006
dc.identifier 10.1145/1143549.1143618
dc.identifier.isbn 1595933069
dc.identifier.isbn 9781595933065
dc.identifier.issn
dc.identifier.uri http://hdl.handle.net/10938/11268
dc.description.abstract In this paper we present ESCORT, an Enterprise, policy-baSed security prOtocol for protecting relational daTabase network objects. ESCORT is an efficient end-to-end security architecture that ensures the confidentiality and integrity of database objects flowing over network links between the Enterprise Information System (EIS) layer represented mainly in relational database servers and the client layer represented by a large variety of devices with diverse capabilities and resources. ESCORT is designed to provide the suitable security strength for a wide range of enterprise application configurations without compromising the application's efficiency and performance. It secures data based on content and sensitivity and highly surpasses the performance of bulk encryption protocols such as the SSL protocol and the TLS protocol by utilizing a customizable policy-based security architecture. This policy-based architecture makes use of the relational structure of database objects to provide flexible, multi-level, and fine-grained encryption and hashing methodologies that target the field level in the database result object. Moreover, ESCORT'S security policy can be configured to hit the byte- level granularity in securing individual database fields. This makes ESCORT a very efficient choice for operation in wireless enterprise environments characterized by low-bandwidth wireless networks and supporting limited-resource wireless devices with low memory and processing power. ESCORT neither deals with the security of static data in the database store nor requires the encryption of database objects at the storage level. Results show a performance gain by a factor of three for ESCORT as compared to bulk encryption. Copyright 2006 ACM.
dc.format.extent
dc.format.extent Pages: (343-348)
dc.language English
dc.relation.ispartof Publication Name: IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference; Conference Title: IWCMC 2006 - 2006 International Wireless Communications and Mobile Computing Conference; Conference Date: 3 July 2006 through 6 July 2006; Conference Location: Vancouver, BC; Publication Year: 2006; Volume: 2006; Pages: (343-348);
dc.relation.ispartofseries
dc.relation.uri
dc.source Scopus
dc.subject.other
dc.title An enterprise policy-based security protocol for protecting relational database network objects
dc.type Conference Paper
dc.contributor.affiliation Itani, W., Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.affiliation Kayssi, A., Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.affiliation Chehab, A., Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon
dc.contributor.authorAddress Itani, W.; Department of Electrical and Computer Engineering, American University of Beirut, Beirut 1107 2020, Lebanon; email: wg101@aub.edu.lb
dc.contributor.authorCorporate University: American University of Beirut; Faculty: Faculty of Engineering and Architecture; Department: Electrical and Computer Engineering;
dc.contributor.authorDepartment Electrical and Computer Engineering
dc.contributor.authorDivision
dc.contributor.authorEmail
dc.contributor.authorFaculty Faculty of Engineering and Architecture
dc.contributor.authorInitials
dc.contributor.authorOrcidID
dc.contributor.authorReprintAddress
dc.contributor.authorResearcherID
dc.contributor.authorUniversity American University of Beirut
dc.description.cited
dc.description.citedCount
dc.description.citedTotWOSCount
dc.description.citedWOSCount
dc.format.extentCount 6
dc.identifier.articleNo
dc.identifier.coden
dc.identifier.pubmedID
dc.identifier.scopusID 34247342253
dc.identifier.url
dc.publisher.address
dc.relation.ispartofConference Conference Title: IWCMC 2006 - 2006 International Wireless Communications and Mobile Computing Conference : Conference Date: 3 July 2006 through 6 July 2006 , Conference Location: Vancouver, BC.
dc.relation.ispartofConferenceCode 69532
dc.relation.ispartofConferenceDate 3 July 2006 through 6 July 2006
dc.relation.ispartofConferenceHosting
dc.relation.ispartofConferenceLoc Vancouver, BC
dc.relation.ispartofConferenceSponsor Bell Canada;IEEE Computer Society, Vancouver Local Chapter
dc.relation.ispartofConferenceTitle IWCMC 2006 - 2006 International Wireless Communications and Mobile Computing Conference
dc.relation.ispartofFundingAgency
dc.relation.ispartOfISOAbbr
dc.relation.ispartOfIssue
dc.relation.ispartOfPart
dc.relation.ispartofPubTitle IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference
dc.relation.ispartofPubTitleAbbr IWCMC Proc. Int. Wireless Com. Mob. Comput. Conf.
dc.relation.ispartOfSpecialIssue
dc.relation.ispartOfSuppl
dc.relation.ispartOfVolume 2006
dc.source.ID
dc.type.publication Series
dc.subject.otherAuthKeyword Customizable security
dc.subject.otherAuthKeyword Policy-driven security
dc.subject.otherAuthKeyword Relational databases
dc.subject.otherAuthKeyword Security
dc.subject.otherChemCAS
dc.subject.otherIndex Bandwidth
dc.subject.otherIndex Cryptography
dc.subject.otherIndex Database systems
dc.subject.otherIndex Information systems
dc.subject.otherIndex Security of data
dc.subject.otherIndex Wireless networks
dc.subject.otherIndex Computer science
dc.subject.otherIndex Mobile computing
dc.subject.otherIndex Network architecture
dc.subject.otherIndex Network protocols
dc.subject.otherIndex Wireless telecommunication systems
dc.subject.otherIndex Customizable security
dc.subject.otherIndex Enterprise Information System (EIS)
dc.subject.otherIndex Policy driven security
dc.subject.otherIndex Relational databases
dc.subject.otherIndex Routing protocols
dc.subject.otherIndex Network security
dc.subject.otherIndex Customizable
dc.subject.otherIndex Database objects
dc.subject.otherIndex Encryption protocols
dc.subject.otherIndex End-to-end security
dc.subject.otherIndex Enterprise applications
dc.subject.otherIndex Enterprise environment
dc.subject.otherIndex Enterprise information system
dc.subject.otherIndex Field level
dc.subject.otherIndex Low memory
dc.subject.otherIndex Low-bandwidth
dc.subject.otherIndex Network links
dc.subject.otherIndex Network objects
dc.subject.otherIndex Performance Gain
dc.subject.otherIndex Processing power
dc.subject.otherIndex Relational Database
dc.subject.otherIndex Relational structures
dc.subject.otherIndex Security Architecture
dc.subject.otherIndex Security policy
dc.subject.otherIndex Security protocols
dc.subject.otherIndex Security strengths
dc.subject.otherIndex SSl protocol
dc.subject.otherIndex Storage level
dc.subject.otherIndex Wireless devices
dc.subject.otherKeywordPlus
dc.subject.otherWOS


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Scholarworks


Browse

My Account