Protecting Web Application Code and Sensitive Data with Symmetric and Identity-Based Cryptosystems.
Jinchao NiZiyan LiuNing LiCheng ZhangBo CuiHanzhang KongPublished in: ICPCSEE (2) (2021)
Keyphrases
- sensitive data
- web applications
- protection mechanisms
- sql injection
- signature scheme
- unauthorized access
- smart card
- data storage
- privacy preserving
- secret key
- information security
- third party
- data sharing
- sensitive information
- encryption scheme
- key management
- standard model
- security vulnerabilities
- digital signature
- business logic
- public key
- end users
- web services
- source code
- privacy protection
- security analysis
- elliptic curve
- countermeasures
- cryptographic protocols
- database management systems
- access control
- security issues
- relational databases
- database