Academic literature on the topic 'Transparent Data Encryption (TDE)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Transparent Data Encryption (TDE).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Transparent Data Encryption (TDE)"

1

Vijay, Kumar Tiwari. "About Oracle TDE (Transparent Data Encryption)." International Journal of Trend in Scientific Research and Development 4, no. 1 (2019): 1085. https://doi.org/10.5281/zenodo.3609978.

Full text
Abstract:
The Transparent Data Encryption feature was announced in Oracle 10g Database Release 2 to simplify the encryption of data within datafiles, tables stopping access to it from the operating system. Tablespace encryption extends this technology, allowing encryption of the entire insides of a tablespace and tables. Vijay Kumar Tiwari "About Oracle TDE (Transparent Data Encryption)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29814.pdf
APA, Harvard, Vancouver, ISO, and other styles
2

Researcher. "DATA PROTECTION STRATEGIES WITH ORACLE 19C TDE." International Journal of Information Security (IJIS) 3, no. 2 (2024): 1–22. https://doi.org/10.5281/zenodo.13169157.

Full text
Abstract:
In today’s age safeguarding data privacy and security has become a priority, for organizations in various industries. The rise in cyber threats and strict regulations highlight the need for measures to secure data. The findings indicate that Oracle 19c TDE offers a seamless and effective solution for data encryption, balancing security and performance. TDE offers functionality that streamlines encryption methods. Transparent Data Encryption (TDE) plays a role in addressing these security concerns by encrypting database files at the storage level ensuring data protection while avoiding th
APA, Harvard, Vancouver, ISO, and other styles
3

Beley, Olexander. "FEATURES OF THE MANAGEMENT OF DATA ENCRYPTION KEYS IN THE CLOUD STORAGE MS SQL AZURE." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 8, no. 4 (2018): 12–15. http://dx.doi.org/10.5604/01.3001.0012.8013.

Full text
Abstract:
The main principles of data security and access organization in the Microsoft Azure cloud storage are considered. A role of hierarchy and access keys are presented. We describe the setup and the use of their keys (BYOK) for transparent data encryption (TDE) using Azure Key Vault keyring.
APA, Harvard, Vancouver, ISO, and other styles
4

Sirisha, N., and K. V.D. Kiran. "Authorization of Data In Hadoop Using Apache Sentry." International Journal of Engineering & Technology 7, no. 3.6 (2018): 234. http://dx.doi.org/10.14419/ijet.v7i3.6.14978.

Full text
Abstract:
Big Data has become more popular, as it can provide on-demand, reliable and flexible services to users such as storage and its processing. The data security has become a major issue in the Big data. The open source HDFS software is used to store huge amount of data with high throughput and fault tolerance and Map Reduce is used for its computations and processing. However, it is a significant target in the Hadoop system, security model was not designed and became the major drawback of Hadoop software. In terms of storage, meta data security, sensitive data and also the data security will be an
APA, Harvard, Vancouver, ISO, and other styles
5

Researcher. "COMPREHENSIVE REVIEW OF INNOVATIONS IN CLOUD INFRASTRUCTURE, AI-DRIVEN CYBERSECURITY, AND ADVANCED IPTV TECHNOLOGIES." Journal of Software Engineering (JSE) 2, no. 2 (2024): 33–42. https://doi.org/10.5281/zenodo.14055967.

Full text
Abstract:
This paper provides a detailed review of recent advancements in cloud infrastructure automation, artificial intelligence (AI) applications in cybersecurity, and advanced IPTV technologies, highlighting their transformative roles in digital innovation. Key areas explored include Terraform’s capabilities in Infrastructure as Code (IaC), which significantly enhance automation in cloud environments, alongside AI-driven security protocols that fortify threat detection and response mechanisms. Furthermore, the paper examines Very Large Scale Integration (VLSI) implementations in IPTV for optim
APA, Harvard, Vancouver, ISO, and other styles
6

Sibaram, Prasad Panda. "Data Security Mechanisms in Database Management." International Journal of Computer Application 15, no. 3 (2025): 1–14. https://doi.org/10.5281/zenodo.15469196.

Full text
Abstract:
<strong>Abstract-</strong> Database security has gained wide notoriety among many individuals worldwide due to the increase in publicized incidents of the loss of or unauthorized exposure to sensitive or confidential data from major corporations, government agencies, and academic institutions. The amount of data collected, retained, and shared electronically by many institutions is steadily increasing. Consequently, the need for individuals to understand the issues, challenges, and available solutions of database security is being realized. At its core, database security strives to ensure that
APA, Harvard, Vancouver, ISO, and other styles
7

Kaliappan, Vishnu Kumar, Seungjin Yu, Rajasoundaran Soundararajan, Sangwoo Jeon, Dugki Min, and Enumi Choi. "High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption." Energies 15, no. 15 (2022): 5544. http://dx.doi.org/10.3390/en15155544.

Full text
Abstract:
In recent years, container-based virtualization technology for edge and cloud computing has advanced dramatically. Virtualization solutions based on Docker Containers provide a more lightweight and efficient virtual environment for Edge and cloud-based applications. Because their use is growing on its own and is still in its early phases, these technologies will face a slew of security issues. Vulnerabilities and malware in Docker container images are two serious security concerns. The risk of privilege escalation is increased because Docker containers share the Linux kernel. This study presen
APA, Harvard, Vancouver, ISO, and other styles
8

Alohali, Manal Abdullah, Mohammed Aljebreen, Fuad Al-Mutiri, et al. "Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments." Sustainability 15, no. 6 (2023): 5133. http://dx.doi.org/10.3390/su15065133.

Full text
Abstract:
The real world is bounded by people, hospitals, industries, buildings, businesses, vehicles, cognitive cities, and billions of devices that offer various services and interact with the world. Recent technologies, including AR, VR, XR, and the digital twin concept, provide advanced solutions to create a new virtual world. Due to the ongoing development of information communication technologies and broadcast channels, data security has become a major concern. Blockchain (BC) technology is an open, decentralized, and transparent distributed database that can be maintained by the group. BC’s major
APA, Harvard, Vancouver, ISO, and other styles
9

Ranga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 2, no. 1 (2016): 1–14. https://doi.org/10.5281/zenodo.14282101.

Full text
Abstract:
The rapid growth of transaction operation data has introduced significant challenges related to balancing the need for data sharing and ensuring privacy protection. As transactions increasingly become more complex and data-driven, the sharing of this data across various stakeholders, while maintaining confidentiality and integrity, has become a critical concern. The contradiction between the transparent and immutable nature of transaction data in distributed systems and the need for stringent privacy measures presents a unique problem for industries dealing with sensitive transaction informati
APA, Harvard, Vancouver, ISO, and other styles
10

Ranga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 1 (2022): 1–14. https://doi.org/10.5281/zenodo.14513534.

Full text
Abstract:
The rapid growth of transaction operation data has introduced significant challenges related to balancing the need for data sharing and ensuring privacy protection. As transactions increasingly become more complex and data-driven, the sharing of this data across various stakeholders, while maintaining confidentiality and integrity, has become a critical concern. The contradiction between the transparent and immutable nature of transaction data in distributed systems and the need for stringent privacy measures presents a unique problem for industries dealing with sensitive transaction informati
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Transparent Data Encryption (TDE)"

1

Moulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.

Full text
Abstract:
In the digital world of today, information is always at risk regardless of its state, at rest or in transit. Cryptography is the technology that promises to address the security issues that emerge. Hence, it was a reasonable consequence to introduce cryptography to databases. However, manually encrypting and decrypting data along with the key management is a burden for the regular user of a database. The need for removing this burden gave birth to Transparent Data Encryption (TDE).   TDE technology is widely available nowadays and a number of vendors have developed their own solutions for prot
APA, Harvard, Vancouver, ISO, and other styles
2

Junior, Marcos Antonio Simplício. "Algoritmos de autenticação de mensagens para redes de sensores." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-11082010-114456/.

Full text
Abstract:
Prover segurança às informações trafegadas nos mais diversos tipos de redes é algo essencial. Entretanto, redes altamente dependentes de dispositivos com recursos limitados (como sensores, tokens e smart cards) apresentam um desafio importante: a reduzida disponibilidade de memória e energia destes dispositivos, bem como sua baixa capacidade de processamento, dificultam a utilização de diversos algoritmos criptográficos considerados seguros atualmente. Este é o caso não apenas de cifras simétricas, que proveem confidencialidade aos dados, mas também de MACs (Message Authentication Code, ou Cód
APA, Harvard, Vancouver, ISO, and other styles
3

(6012225), Huian Li. "Transparent and Mutual Restraining Electronic Voting." Thesis, 2019.

Find full text
Abstract:
Many e-voting techniques have been proposed but not widely used in reality. One of the problems associated with most of existing e-voting techniques is the lack of transparency, leading to a failure to deliver voter assurance. In this work, we propose a transparent, auditable, end-to-end verifiable, and mutual restraining e-voting protocol that exploits the existing multi-party political dynamics such as in the US. The new e-voting protocol consists of three original technical contributions -- universal verifiable voting vector, forward and backward mutual lock voting, and in-process check an
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Transparent Data Encryption (TDE)"

1

Blinn, Eric. SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Anderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Anderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Routledge, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Transparent Data Encryption (TDE)"

1

Gasser, Linus, and Imad Aad. "Disk, File and Database Encryption." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_33.

Full text
Abstract:
AbstractDisk, file, and database encryption are technologies that protect data confidentiality when stored. Full disk encryption encrypts all data on a disk except the part containing the code to unlock the rest of the disk, which is usually not encrypted. File-based encryption operates at the file level and can be done by the operating system or an application. Database encryption can be done using transparent database encryption, column-level encryption, or field-level encryption. Both full disk encryption and File-based encryption allow good protection against data leakage in the case of de
APA, Harvard, Vancouver, ISO, and other styles
2

Coles, Michael, and Rodney Landrum. "Transparent Data Encryption." In Expert SQL Server 2008 Encryption. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-3365-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McGiffen, Matthew. "Introducing Transparent Data Encryption." In Pro Encryption in SQL Server 2022. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8664-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barać, Zoran, and Daniel Scott-Raynsford. "Configuring Transparent Data Encryption to Bring Your Own Key." In Azure SQL Hyperscale Revealed. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9225-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chang, Chaowen, Shuai Wang, Yutong Wang, and PeiSheng Han. "Research of Terminal Transparent Encryption Storage Mechanism for Multi-cloud Disks." In Cloud Computing and Big Data. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-28430-9_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Teijeiro, Lucía Gómez, and Thomas Maillart. "Trends in Open Source Software for Data Protection and Encryption Technologies." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_40.

Full text
Abstract:
AbstractSoftware editors and practitioners have increasingly developed and used open-source software tools to implement their cybersecurity strategies. By its unique intellectual property regime, open-source software fosters transparency and sharing values, which have been recognized as important to finding and fixing vulnerabilities and quickly avoiding threats. By selecting 41 technologies related to the one presented in the book, we show that open-source software for cybersecurity is a rapidly growing complex ecosystem of 3456 GitHub repositories with 5000+ users. While some repositories ar
APA, Harvard, Vancouver, ISO, and other styles
7

Majumdar, Subhabrata. "Standards for LLM Security." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_25.

Full text
Abstract:
AbstractThe National Institute of Standards and Technology (NIST) is a recognized authority on computer security that publishes guidelines and standards for a broad range of technologies, including artificial intelligence (AI). The guidelines include the requirement for LLM decision-making transparency, explainability, testing, and validation to guarantee model reliability and security. Moreover, the NIST has also created standards for cryptography, a critical element of many LLM-based applications, such as secure communication and data encryption. The cryptography standards help ensure that L
APA, Harvard, Vancouver, ISO, and other styles
8

Blinn, Eric. "Managing TDE." In SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Blinn, Eric. "Moving a TDE Enabled Database." In SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mannan, Mamun Abdul. "Data Privacy in E-Commerce." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. https://doi.org/10.4018/979-8-3693-9491-5.ch017.

Full text
Abstract:
To explore the challenges of data privacy in e-commerce and to identify best practices for protecting consumer data in online transactions. The chapter uses library and document analysis to review case studies, industry reports, and academic literature on data privacy in e-commerce.The chapter assesses how e-commerce platforms handle consumer data and the effectiveness of various privacy measures. The major findings of the chapter is that e-commerce platforms face significant challenges in protecting consumer data, including issues related to data breaches, inadequate privacy policies, and evo
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Transparent Data Encryption (TDE)"

1

Ma, Junchao, Yu Tian, Yanchang Feng, et al. "ZTKA: A Zero-Trust Based Kernel Encryption Architecture for Transparent Data Protection." In 2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2025. https://doi.org/10.1109/cscwd64889.2025.11033649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhan, Wei, Bo Jin, Huan Xu, and Chenxi Dong. "Data Security Management Based on Transparent Encryption Policy." In 2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2022. http://dx.doi.org/10.1109/icmnwc56175.2022.10032001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yang, Xuelin, Amber Sultan, Adnan Hajomer, Liuming Zhang, and Weisheng Hu. "Physical-Layer OFDM Data Encryption using Chaotic QAM Mapping." In 2019 21st International Conference on Transparent Optical Networks (ICTON). IEEE, 2019. http://dx.doi.org/10.1109/icton.2019.8840402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pang, Pengfei, Khaled Aourra, Yuan Xue, YuanZhang Li, and QuanXin Zhang. "A Transparent Encryption Scheme of Video Data for Android Devices." In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). IEEE, 2017. http://dx.doi.org/10.1109/cse-euc.2017.163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Han Chen, Xuelin Yang, Weiqiang Sun, and Weisheng Hu. "Physical-layer OFDM data encryption using chaotic ZCMT precoding matrix." In 2017 19th International Conference on Transparent Optical Networks (ICTON). IEEE, 2017. http://dx.doi.org/10.1109/icton.2017.8024916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Geng, Cong, Xuelin Yang, Weiqiang Sun, and Weisheng Hu. "Multi-Fold Physical Layer Data Encryption Using Chaotic Frequency Hopping." In 2018 20th International Conference on Transparent Optical Networks (ICTON). IEEE, 2018. http://dx.doi.org/10.1109/icton.2018.8473904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Natarajan, K., and Vaheedbasha Shaik. "Transparent Data Encryption: Comparative Analysis and Performance Evaluation of Oracle Databases." In 2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN). IEEE, 2020. http://dx.doi.org/10.1109/icrcicn50933.2020.9296168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lukaj, Valeria, Alessio Catalfamo, Francesco Martella, Maria Fazio, Massimo Villari, and Antonio Celesti. "A NoSQL DBMS Transparent Data Encryption Approach for Cloud/Edge Continuum." In 2023 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2023. http://dx.doi.org/10.1109/iscc58397.2023.10217933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Raddo, Thiago R., Simon Rommel, Victor Land, Chigo Okonkwo, and Idelfonso Tafur Monroy. "Quantum Data Encryption as a Service on Demand: Eindhoven QKD Network Testbed." In 2019 21st International Conference on Transparent Optical Networks (ICTON). IEEE, 2019. http://dx.doi.org/10.1109/icton.2019.8840238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, Ji, and Andreas Klein. "A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud." In 2009 International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE, 2009. http://dx.doi.org/10.1109/dasc.2009.85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!