Figure 3From: Confidential database-as-a-service approaches: taxonomy and survey The attacker-security property mapping shows which security properties a CPI has to satisfy in order to protect against specific attackers. An approach that provides computational record protection against a given attacker model has to satisfy the security properties that cover the cell that represents the assumed attacker model.Back to article page