Subject | Key management with encrypted databases |
---|---|
Author | Ann Harrison |
Post date | 2012-04-04T15:36:53Z |
Perhaps I missed the discussion of key management in the flurry of
how to encrypt databases discussion. How are you going to avoid
man-in-the-middle attacks?
Cheers,
Ann
[Non-text portions of this message have been removed]
how to encrypt databases discussion. How are you going to avoid
man-in-the-middle attacks?
Cheers,
Ann
[Non-text portions of this message have been removed]