Skip to main content

Advances, Systems and Applications

Figure 3 | Journal of Cloud Computing

Figure 3

From: Confidential database-as-a-service approaches: taxonomy and survey

Figure 3

The attacker-security property mapping shows which security properties a CPI has to satisfy in order to protect against specific attackers. An approach that provides computational record protection against a given attacker model has to satisfy the security properties that cover the cell that represents the assumed attacker model.

Back to article page