Subject Key management with encrypted databases
Author Ann Harrison
Perhaps I missed the discussion of key management in the flurry of
how to encrypt databases discussion. How are you going to avoid
man-in-the-middle attacks?

Cheers,

Ann


[Non-text portions of this message have been removed]