Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases.
Ahmad Baraani-DastjerdiJosef PieprzykReihaneh Safavi-NainiJanusz R. GettaPublished in: J. Univers. Comput. Sci. (1997)
Keyphrases
- hash functions
- discretionary access control
- operating system
- similarity search
- role based access control
- random projections
- object oriented databases
- locality sensitive hashing
- locality sensitive
- hamming distance
- nearest neighbor search
- secret key
- binary codes
- data distribution
- stream cipher
- privacy preservation
- access control
- encryption scheme
- data analysis
- block cipher
- management system