| Subject | Key management with encrypted databases |
|---|---|
| Author | Ann Harrison |
| Post date | 2012-04-04T15:36:53Z |
Perhaps I missed the discussion of key management in the flurry of
how to encrypt databases discussion. How are you going to avoid
man-in-the-middle attacks?
Cheers,
Ann
[Non-text portions of this message have been removed]
how to encrypt databases discussion. How are you going to avoid
man-in-the-middle attacks?
Cheers,
Ann
[Non-text portions of this message have been removed]