Skip to main content
Fig. 1 | Journal of Internet Services and Applications

Fig. 1

From: A framework for searching encrypted databases

Fig. 1

Sequence diagram representing the process of generating and processing an encrypted query. The proxy is positioned between the user and the DBMS in a trusted environment. Its responsibility is to receive a plaintext query, apply an encryption protocol, submit the encrypted query to the DBMS, and decrypt the outcome

Back to article page