{"id":"https://openalex.org/W3007080887","doi":"https://doi.org/10.1145/3377644.3377662","title":"Security and Encryption at Modern Databases","display_name":"Security and Encryption at Modern Databases","publication_year":2020,"publication_date":"2020-01-10","ids":{"openalex":"https://openalex.org/W3007080887","doi":"https://doi.org/10.1145/3377644.3377662","mag":"3007080887"},"language":"en","primary_location":{"id":"doi:10.1145/3377644.3377662","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377644.3377662","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051362257","display_name":"Martin Ocenas","orcid":null},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Martin Ocenas","raw_affiliation_strings":["Brno University of Technology, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology, Czech Republic","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037488079","display_name":"Ivan Homoliak","orcid":"https://orcid.org/0000-0002-0790-0875"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Ivan Homoliak","raw_affiliation_strings":["Brno University of Technology, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology, Czech Republic","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008969416","display_name":"Petr Han\u00e1\u010dek","orcid":"https://orcid.org/0000-0001-5507-0768"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Petr Hanacek","raw_affiliation_strings":["Brno University of Technology, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology, Czech Republic","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088145356","display_name":"Kamil Malinka","orcid":"https://orcid.org/0000-0002-9009-2193"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Kamil Malinka","raw_affiliation_strings":["Brno University of Technology, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology, Czech Republic","institution_ids":["https://openalex.org/I60587646"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051362257"],"corresponding_institution_ids":["https://openalex.org/I60587646"],"apc_list":null,"apc_paid":null,"fwci":0.5302,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.71424895,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7271748781204224},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7084215879440308},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.504932701587677},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38340750336647034}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7271748781204224},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7084215879440308},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.504932701587677},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38340750336647034}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3377644.3377662","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3377644.3377662","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8199999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W150223756","https://openalex.org/W1569778844","https://openalex.org/W1995120430","https://openalex.org/W2031533839","https://openalex.org/W2059103530","https://openalex.org/W2134886589","https://openalex.org/W2255638286","https://openalex.org/W2397423248","https://openalex.org/W2592789682","https://openalex.org/W2766393794","https://openalex.org/W2766423648","https://openalex.org/W2788385473","https://openalex.org/W2952749319","https://openalex.org/W3000984796","https://openalex.org/W3124215730","https://openalex.org/W4288083473","https://openalex.org/W6606067566","https://openalex.org/W6712237015","https://openalex.org/W6748960622"],"related_works":["https://openalex.org/W2362737126","https://openalex.org/W2290623933","https://openalex.org/W2354995278","https://openalex.org/W2350992405","https://openalex.org/W2369342331","https://openalex.org/W2391717201","https://openalex.org/W2348544381","https://openalex.org/W1762411088","https://openalex.org/W3024231903","https://openalex.org/W2809381512"],"abstract_inverted_index":{"Data":[0],"is":[1,51,65],"a":[2],"most":[3,7],"valuable":[4],"part":[5,36],"of":[6,8,13,37,77,82,97,105,113],"nowadays":[9],"system.":[10,115],"A":[11],"lot":[12],"hackers":[14],"and":[15,85],"criminals":[16],"are":[17,100],"trying":[18],"to":[19,27,46,57,69,90,107],"steal":[20],"this":[21],"data":[22,29,84,93],"all":[23],"the":[24,33,59,92],"time.":[25],"Due":[26],"that":[28,50],"should":[30],"also":[31],"be":[32,47],"best":[34],"protected":[35],"every":[38],"company's":[39],"systems.":[40],"We":[41],"would":[42],"like":[43],"our":[44,63],"systems":[45],"impenetrable,":[48],"but":[49],"not":[52],"possible.":[53],"If":[54],"we":[55,67],"want":[56],"protect":[58],"data,":[60],"in":[61],"case":[62],"system":[64],"compromised,":[66],"need":[68],"use":[70],"encryption.":[71,95],"This":[72],"article":[73],"describes":[74],"traditional":[75],"ways":[76],"database":[78],"encryption,":[79],"modern":[80],"concept":[81],"securing":[83],"some":[86],"possible":[87],"concepts":[88],"how":[89],"secure":[91],"using":[94],"All":[96],"these":[98],"approaches":[99],"discussed":[101],"from":[102],"high-level":[103],"point":[104],"view":[106],"show":[108],"their":[109],"impact":[110],"on":[111],"security":[112],"entire":[114]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
