On 08/31/14 23:23, James Starkey wrote:
> Let's try another tack on this problem.  What is the best possible way to
> solve it if schedule were not a problem?  And is this a special case of a
> more general problem?
>
> Here's an idea to get the creative juices working:  Suppose the database
> parameter block were extended with a composite containing quadruples of
> <schema, table, field, key>, and if given, instances of the given field
> would be encrypted and/or descripted with the given key.  This would be
> robust, defensible security for any field and would be easy to implement in
> both database tools and the database engine, and would have no impact on
> system tables, the API, or transmission layers.  Carlos would be happy, the
> hard-security guys would be happy, and the mechanism would generalize to
> user as well as system tables.
>
> This is a starter solution.  There must be many more lurking out there.
>

But what prevents anyone to use that present in database key to decrypt 
procedure code and watch it?


------------------------------------------------------------------------------
Slashdot TV.  
Video for Nerds.  Stuff that matters.
http://tv.slashdot.org/
Firebird-Devel mailing list, web interface at 
https://lists.sourceforge.net/lists/listinfo/firebird-devel

Reply via email to