{"id":"https://openalex.org/W3093643701","doi":"https://doi.org/10.1109/ewdts50664.2020.9224775","title":"Cryptographic Algorithm Implementation for Data Encryption in DBMS MS SQL Server","display_name":"Cryptographic Algorithm Implementation for Data Encryption in DBMS MS SQL Server","publication_year":2020,"publication_date":"2020-09-01","ids":{"openalex":"https://openalex.org/W3093643701","doi":"https://doi.org/10.1109/ewdts50664.2020.9224775","mag":"3093643701"},"language":"en","primary_location":{"id":"doi:10.1109/ewdts50664.2020.9224775","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts50664.2020.9224775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE East-West Design &amp; Test Symposium (EWDTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063458973","display_name":"Olga Safaryan","orcid":"https://orcid.org/0000-0002-7508-913X"},"institutions":[{"id":"https://openalex.org/I4210097717","display_name":"Don State Technical University","ror":"https://ror.org/00x5je630","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210097717"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Olga A. Safaryan","raw_affiliation_strings":["Information System Cybersecurity Department, Don State Technical University, Rostov\u2013on\u2013Don, Russia"],"affiliations":[{"raw_affiliation_string":"Information System Cybersecurity Department, Don State Technical University, Rostov\u2013on\u2013Don, Russia","institution_ids":["https://openalex.org/I4210097717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060132110","display_name":"Evgeniya Roshchina","orcid":"https://orcid.org/0000-0001-5729-4191"},"institutions":[{"id":"https://openalex.org/I4210097717","display_name":"Don State Technical University","ror":"https://ror.org/00x5je630","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210097717"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Evgenia V. Roshchina","raw_affiliation_strings":["Information System Cybersecurity Department, Don State Technical University, Rostov\u2013on\u2013Don, Russia"],"affiliations":[{"raw_affiliation_string":"Information System Cybersecurity Department, Don State Technical University, Rostov\u2013on\u2013Don, Russia","institution_ids":["https://openalex.org/I4210097717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045255569","display_name":"Larissa V. Cherckesova","orcid":"https://orcid.org/0000-0002-9392-3140"},"institutions":[{"id":"https://openalex.org/I4210097717","display_name":"Don State Technical University","ror":"https://ror.org/00x5je630","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210097717"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Larissa V. Cherckesova","raw_affiliation_strings":["Information System Cybersecurity Department, Don State Technical University, Rostov\u2013on\u2013Don, Russia"],"affiliations":[{"raw_affiliation_string":"Information System Cybersecurity Department, Don State Technical University, Rostov\u2013on\u2013Don, Russia","institution_ids":["https://openalex.org/I4210097717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053935173","display_name":"Elena Pinevich","orcid":"https://orcid.org/0000-0001-6008-7222"},"institutions":[{"id":"https://openalex.org/I4210097717","display_name":"Don State Technical University","ror":"https://ror.org/00x5je630","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210097717"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Elena V. Pinevich","raw_affiliation_strings":["Information System Cybersecurity Department, Don State Technical University, Rostov\u2013on\u2013Don, Russia"],"affiliations":[{"raw_affiliation_string":"Information System Cybersecurity Department, Don State Technical University, Rostov\u2013on\u2013Don, Russia","institution_ids":["https://openalex.org/I4210097717"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018349292","display_name":"Andrey G. Lobodenko","orcid":null},"institutions":[{"id":"https://openalex.org/I3020615197","display_name":"Institute of Service and Entrepreneurship of DGTU","ror":"https://ror.org/01rzj1953","country_code":"RU","type":"education","lineage":["https://openalex.org/I3020615197"]},{"id":"https://openalex.org/I4210097717","display_name":"Don State Technical University","ror":"https://ror.org/00x5je630","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210097717"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Andrey G. Lobodenko","raw_affiliation_strings":["Information Systems and Radioengineering Department, Shakhty Branch of Don State Technical University, Rostov\u2013on\u2013Don, Russia"],"affiliations":[{"raw_affiliation_string":"Information Systems and Radioengineering Department, Shakhty Branch of Don State Technical University, Rostov\u2013on\u2013Don, Russia","institution_ids":["https://openalex.org/I3020615197","https://openalex.org/I4210097717"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054884066","display_name":"Boris A. Akishin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210097717","display_name":"Don State Technical University","ror":"https://ror.org/00x5je630","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210097717"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Boris A. Akishin","raw_affiliation_strings":["Mathematics and Computer Science Department, Don State Technical University, Rostov\u2013on\u2013Don, Russia"],"affiliations":[{"raw_affiliation_string":"Mathematics and Computer Science Department, Don State Technical University, Rostov\u2013on\u2013Don, Russia","institution_ids":["https://openalex.org/I4210097717"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5063458973"],"corresponding_institution_ids":["https://openalex.org/I4210097717"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13097706,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"70?298","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.9591000080108643,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.9591000080108643,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8485872745513916},{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.7031622529029846},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.6408755779266357},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6267626285552979},{"id":"https://openalex.org/keywords/user-defined-function","display_name":"User-defined function","score":0.5164973139762878},{"id":"https://openalex.org/keywords/data-transformation-services","display_name":"Data Transformation Services","score":0.4566596448421478},{"id":"https://openalex.org/keywords/stored-procedure","display_name":"Stored procedure","score":0.4361853003501892},{"id":"https://openalex.org/keywords/sql","display_name":"SQL","score":0.42761799693107605},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4142928719520569},{"id":"https://openalex.org/keywords/query-by-example","display_name":"Query by Example","score":0.34489989280700684},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12409195303916931}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8485872745513916},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.7031622529029846},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.6408755779266357},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6267626285552979},{"id":"https://openalex.org/C206384180","wikidata":"https://www.wikidata.org/wiki/Q599380","display_name":"User-defined function","level":5,"score":0.5164973139762878},{"id":"https://openalex.org/C141589383","wikidata":"https://www.wikidata.org/wiki/Q644775","display_name":"Data Transformation Services","level":5,"score":0.4566596448421478},{"id":"https://openalex.org/C154420247","wikidata":"https://www.wikidata.org/wiki/Q846619","display_name":"Stored procedure","level":5,"score":0.4361853003501892},{"id":"https://openalex.org/C510870499","wikidata":"https://www.wikidata.org/wiki/Q47607","display_name":"SQL","level":2,"score":0.42761799693107605},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4142928719520569},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.34489989280700684},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12409195303916931},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ewdts50664.2020.9224775","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts50664.2020.9224775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE East-West Design &amp; Test Symposium (EWDTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2034085336","https://openalex.org/W2041971370","https://openalex.org/W2059103530","https://openalex.org/W2278095558","https://openalex.org/W4392415426","https://openalex.org/W6694896285"],"related_works":["https://openalex.org/W2240099544","https://openalex.org/W2512476881","https://openalex.org/W638381921","https://openalex.org/W1890845846","https://openalex.org/W2912795851","https://openalex.org/W2614112517","https://openalex.org/W66203700","https://openalex.org/W2108932068","https://openalex.org/W1725587203","https://openalex.org/W2282090486"],"abstract_inverted_index":{"the":[0,6,14,34,40,49,53,71,75,80],"report":[1],"discusses":[2],"issues":[3],"related":[4],"to":[5,25,59,66,73,79],"MS":[7,35,61],"SQL":[8,36,62],"database":[9],"administration,":[10],"as":[11,13],"well":[12],"basic":[15],"methods":[16],"for":[17],"implementing":[18],"backup":[19,76],"and":[20,65],"encryption.":[21],"It":[22],"is":[23,57],"proposed":[24],"create":[26],"an":[27],"application":[28,72,81],"that":[29],"backs":[30],"up":[31],"databases":[32],"in":[33,70],"Server":[37],"DBMS":[38],"using":[39],"GOST":[41],"R":[42],"34.12":[43],"\"Kuznechik\"":[44],"(Grasshopper)":[45],"encryption":[46],"algorithm.":[47],"Developing":[48],"application,":[50],"which":[51],"provides":[52],"secure":[54],"backups":[55],"it":[56],"necessary":[58],"study":[60],"VDI":[63],"technology":[64],"implement":[67],"this":[68],"interface":[69],"transfer":[74],"stream":[77],"directly":[78],"under":[82],"development.":[83]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
