|
[1] G. Singh, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security,” 2013. [2] P. Kumar Tiwari, V. Choudhary, and S. Raj Aman, “Analysis and Comparison of DES, AES, RSA Encryption Algorithms,” in Proceedings - 2022 4th International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2022, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 1913–1918. doi: 10.1109/ICAC3N56670.2022.10073996. [3] Y. Singhal, A. Agarwal, S. Mittal, S. Katyayani, and A. Sharma, “Database Security using Cryptography,” Int J Res Appl Sci Eng Technol, vol. 10, no. 6, pp. 582–587, Jun. 2022, doi: 10.22214/ijraset.2022.43621. [4] S. Radhakrishnan and A. Akila, “Securing Distributed Database Using Elongated RSA Algorithm,” in 2021 7th International Conference on Advanced Computing and Communication Systems, ICACCS 2021, Institute of Electrical and Electronics Engineers Inc., Mar. 2021, pp. 1931–1936. doi: 10.1109/ICACCS51430.2021.9441962. [5] C. Ling, “Research on role-based access control policy of e-government,” in Proceedings of the International Conference on E-Business and E-Government, ICEE 2010, 2010, pp. 714–716. doi: 10.1109/ICEE.2010.186. [6] Y. Zhang, R. H. Deng, S. Xu, J. Sun, Q. Li, and D. Zheng, “Attribute-based Encryption for Cloud Computing Access Control: A Survey,” ACM Computing Surveys, vol. 53, no. 4. Association for Computing Machinery, Sep. 01, 2020. doi: 10.1145/3398036. [7] Z. Zeng, T. Chen, and Y. Zhang, “E-government information security in the web environment based on role based access control technology,” in 2008 International Seminar on Business and Information Management, ISBIM 2008, IEEE Computer Society, 2008, pp. 210–213. doi: 10.1109/ISBIM.2008.246. [8] K. Rajesh Rao, I. G. Ray, W. Asif, A. Nayak, and M. Rajarajan, “R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data,” IEEE Access, vol. 7, pp. 133274–133289, 2019, doi: 10.1109/ACCESS.2019.2941560. [9] S. T. KR and P. N, “Secure Crime Case Summary in Police Station Using Block Chain Technology,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, pp. 50–53, Jul. 2021, doi: 10.32628/cseit217410. [10] X. Feng et al., “Verifiable Decentralized Access Control for Distributed Databases,” in Proceedings - 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2020, Institute of Electrical and Electronics Engineers Inc., Oct. 2020, pp. 248–253. doi: 10.1109/CyberC49757.2020.00046. [11] S. Omer, A. L. Faroog, M. Koko, D. Amin Babiker, and A. / Nabi Mustafa, “Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication,” vol. 17, no. 1, pp. 62–69, doi: 10.9790/0661-17136269. [12] P. Kumar Tiwari, V. Choudhary, and S. Raj Aman, “Analysis and Comparison of DES, AES, RSA Encryption Algorithms,” in Proceedings - 2022 4th International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2022, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 1913–1918. doi: 10.1109/ICAC3N56670.2022.10073996. [13] S. Radhakrishnan and A. Akila, “Securing Distributed Database Using Elongated RSA Algorithm,” in 2021 7th International Conference on Advanced Computing and Communication Systems, ICACCS 2021, Institute of Electrical and Electronics Engineers Inc., Mar. 2021, pp. 1931–1936. doi: 10.1109/ICACCS51430.2021.9441962. [14] R. Ghazal, A. K. Malik, N. Qadeer, B. Raza, A. R. Shahid, and H. Alquhayz, “Intelligent Role-Based Access Control Model and Framework Using Semantic Business Roles in Multi-Domain Environments,” IEEE Access, vol. 8, pp. 12253–12267, 2020, doi: 10.1109/ACCESS.2020.2965333. [15] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based Encryption.” [16] N. A. Fitri, M. Udin, H. Al Rasyid, A. Sudarsono, P. Elektronika, and N. Surabaya, “Medical Health Record Protection Using Ciphertext-Policy Attribute-Based Encryption and Elliptic Curve Digital Signature Algorithm,” EMITTER International Journal of Engineering Technology, vol. 7, no. 1, 2019. [17] T. Lee, H. S. Moon, and J. Jang, “Data encryption method using CP-ABE with symmetric key algorithm in blockchain network,” in International Conference on ICT Convergence, IEEE Computer Society, 2021, pp. 1371–1373. doi: 10.1109/ICTC52510.2021.9620889. [18] Sex Offenders Dataset. Accessed: 10 April 2023. [Online]. Available: Sex Offenders | City of Chicago | Data Portal [19] Current Employee Dataset. Accessed: 10 April 2023. [Online]. Available: Current Employee Names, Salaries, and Position Titles | City of Chicago | Data Portal [20] Public Health Dataset. Accessed: 10 April 2023. [Online]. Available: Public Health Statistics - Selected public health indicators by Chicago community area - Historical | City of Chicago | Data Portal [21] HeidiSQL, MariaDB, MySQL. [Online]. Available: https://www.heidisql.com [22] Welcome to Python. [Online]. Available: https://www.python.org |