Tag

data encryption

0 views collected around this technical thread.

Test Development Learning Exchange
Test Development Learning Exchange
Dec 3, 2024 · Information Security

Implementing a Simple Data Encryption Algorithm Using Caesar Cipher in Python

This tutorial explains the fundamentals of data encryption, introduces the concept of differential privacy, and guides you through implementing and testing a simple Caesar Cipher encryption and decryption algorithm in Python, complete with code examples and execution instructions.

PythonSymmetric EncryptionTutorial
0 likes · 6 min read
Implementing a Simple Data Encryption Algorithm Using Caesar Cipher in Python
Top Architecture Tech Stack
Top Architecture Tech Stack
Oct 21, 2024 · Information Security

Meta fined €91 million for storing passwords in plain text – a GDPR compliance warning

Meta was fined €91 million by Ireland’s Data Protection Commission for storing user passwords in plain text, violating multiple GDPR provisions and highlighting the critical need for proper encryption and data‑security measures in large‑scale online services.

GDPRcompliancedata encryption
0 likes · 4 min read
Meta fined €91 million for storing passwords in plain text – a GDPR compliance warning
Architecture Digest
Architecture Digest
Aug 29, 2024 · Backend Development

mybatis-mate – Enterprise‑level MyBatis Extension for Sharding, Auditing, Encryption, and Data Permissions

The article introduces mybatis-mate, an enterprise‑grade MyBatis module that supports sharding, multi‑datasource, data auditing, field encryption, sensitive‑data masking, automatic DDL maintenance, performance logging, and fine‑grained data‑scope control, providing code examples and configuration guidelines for Spring Boot projects.

Data AuditingJavaMyBatis
0 likes · 15 min read
mybatis-mate – Enterprise‑level MyBatis Extension for Sharding, Auditing, Encryption, and Data Permissions
Selected Java Interview Questions
Selected Java Interview Questions
Jul 20, 2024 · Backend Development

Introduction and Usage Guide for MyBatis-Mate: Enterprise Features for MyBatis-Plus

This article introduces MyBatis-Mate, an official MyBatis‑Plus extension offering enterprise‑level capabilities such as dictionary binding, field encryption, data masking, dynamic DDL maintenance, sharding, multi‑datasource switching, performance logging, and data permission control, with detailed Spring Boot integration examples.

JavaMyBatisSharding
0 likes · 15 min read
Introduction and Usage Guide for MyBatis-Mate: Enterprise Features for MyBatis-Plus
php中文网 Courses
php中文网 Courses
Aug 2, 2023 · Frontend Development

Implementing Data Encryption and Secure Transmission in Vue Applications

This article explains how to protect user data in Vue applications by using HTTPS, encryption algorithms, hash functions, and digital signatures, providing practical code examples for setting up an HTTPS server with Node.js/Express, encrypting data with crypto‑js, and verifying data integrity.

CryptoJSHTTPSVue
0 likes · 5 min read
Implementing Data Encryption and Secure Transmission in Vue Applications
Tencent Cloud Developer
Tencent Cloud Developer
Sep 13, 2022 · Databases

Implementing a Transparent Data Encryption Framework for Database Security

The article presents a transparent data‑encryption framework for database security that uses an AOP‑based driver interceptor to rewrite SQL, encrypt/decrypt sensitive fields, manage performance with locks and caching, support configurable algorithms via SPI/YAML, and guide a three‑phase migration with minimal code intrusion.

AOPSPISQL Interception
0 likes · 11 min read
Implementing a Transparent Data Encryption Framework for Database Security
Selected Java Interview Questions
Selected Java Interview Questions
Jul 4, 2022 · Backend Development

Introducing MyBatis-Mate: Enterprise‑Level Features for MyBatis‑Plus

This article introduces MyBatis‑Mate, an official MyBatis‑Plus extension that provides enterprise‑grade capabilities such as dictionary binding, field encryption, data masking, dynamic table maintenance, audit logging, sharding, multi‑datasource switching, and customizable data‑scope handling, all illustrated with code examples.

JavaMyBatisORM
0 likes · 13 min read
Introducing MyBatis-Mate: Enterprise‑Level Features for MyBatis‑Plus
Weimob Technology Center
Weimob Technology Center
May 12, 2022 · Information Security

Securing Enterprise Data: Inside WKMS’s Scalable Key Management and Encryption Architecture

This article explains how WKMS addresses rising data‑protection regulations by offering a hierarchical key‑management service, masking SDK, AES‑based encryption, robust disaster‑recovery, and high‑throughput performance testing, illustrating a secure yet scalable solution for modern enterprises.

cloud nativedata encryptioninformation security
0 likes · 10 min read
Securing Enterprise Data: Inside WKMS’s Scalable Key Management and Encryption Architecture
JD Tech
JD Tech
Apr 20, 2022 · Information Security

Privacy Compliance Governance Practices in JD Finance Mobile App

This article details JD Finance's comprehensive privacy compliance governance for its mobile app, covering regulatory background, scope definition, key risk areas, policy and permission management, data encryption, sensitive API handling, third‑party SDK control, tooling such as Pandora Kit and Lancet, and the Utrust platform for automated detection and remediation.

SDKautomationcompliance
0 likes · 25 min read
Privacy Compliance Governance Practices in JD Finance Mobile App
Java Architect Essentials
Java Architect Essentials
Feb 15, 2022 · Databases

mybatis-mate: An Enterprise‑Level MyBatis‑Plus Extension for Sharding, Data Auditing, Encryption, and More

This article introduces mybatis-mate, an official MyBatis‑Plus extension that provides enterprise‑grade features such as sharding, multi‑datasource support, data auditing, field encryption, sensitive‑data masking, automatic DDL maintenance, dynamic datasource switching, distributed transaction logging, and fine‑grained data permission control, with detailed usage examples and configuration snippets for Spring Boot projects.

Data AuditingDatabaseJava
0 likes · 15 min read
mybatis-mate: An Enterprise‑Level MyBatis‑Plus Extension for Sharding, Data Auditing, Encryption, and More
Top Architect
Top Architect
Nov 13, 2021 · Backend Development

Introducing MyBatis-Mate: Enterprise‑Level Features for MyBatis‑Plus

This article introduces MyBatis‑Mate, an official MyBatis‑Plus extension that provides enterprise‑grade capabilities such as sharding, data auditing, field encryption, dictionary binding, sensitive data masking, automatic DDL maintenance, dynamic data‑source switching, performance logging, and fine‑grained data‑scope control, all illustrated with practical code examples.

JavaMyBatisMyBatis-Mate
0 likes · 15 min read
Introducing MyBatis-Mate: Enterprise‑Level Features for MyBatis‑Plus
Java Captain
Java Captain
Nov 6, 2021 · Databases

Introducing mybatis-mate: Enterprise‑Level MyBatis Extension for Sharding, Data Encryption, Auditing, and More

The article presents mybatis-mate, an enterprise‑grade MyBatis module that provides sharding, data auditing, sensitive‑word filtering, field encryption, dictionary write‑back, data permission, automatic DDL maintenance, dynamic multi‑datasource switching, and distributed transaction logging, offering developers a more agile and elegant way to handle data.

Data AuditingDatabaseJava
0 likes · 15 min read
Introducing mybatis-mate: Enterprise‑Level MyBatis Extension for Sharding, Data Encryption, Auditing, and More
Architecture Digest
Architecture Digest
Nov 1, 2021 · Databases

Quick Start Guide to Data Desensitization with Apache ShardingSphere and Spring

This article explains how to use Apache ShardingSphere's data desensitization module with Spring and Spring Boot to transparently encrypt sensitive fields such as ID numbers and bank cards, covering pain points, configuration steps, code examples, and datasource integration for compliance‑driven applications.

AESJavaShardingSphere
0 likes · 9 min read
Quick Start Guide to Data Desensitization with Apache ShardingSphere and Spring
iQIYI Technical Product Team
iQIYI Technical Product Team
Sep 10, 2021 · Information Security

Introduction and Business Practice of Cloud KMS for Data Security at iQIYI

iQIYI’s security team created a Cloud KMS platform that, in line with China’s Data Security Law, provides HSM‑backed key lifecycle management, API‑driven encryption, high‑availability deployment and fine‑grained access control, enabling its membership services to meet compliance, cut development effort by ~80 %, halve operational workload and lower costs, while laying groundwork for future features such as traffic splitting and zero‑intrusion integration.

Business PracticeCloud KMScloud computing
0 likes · 7 min read
Introduction and Business Practice of Cloud KMS for Data Security at iQIYI
Java Architecture Diary
Java Architecture Diary
Sep 2, 2021 · Backend Development

Master MyBatis‑Mate: Dictionary Binding, Encryption, Sharding & Data Scope Explained

This guide introduces MyBatis‑Mate’s core capabilities—including dictionary binding, field encryption, data masking, automatic DDL maintenance, dynamic sharding, and data‑scope permissions—while providing Maven dependencies and complete Java code examples for integrating these features into Spring Boot applications.

Data PermissionJavaMyBatis
0 likes · 8 min read
Master MyBatis‑Mate: Dictionary Binding, Encryption, Sharding & Data Scope Explained
Architect's Tech Stack
Architect's Tech Stack
Jul 29, 2021 · Databases

Quick Start Guide to Data Encryption (Masking) with Apache ShardingSphere in Spring and Spring Boot

This article explains how to use Apache ShardingSphere's encryption module to transparently store and query sensitive customer data such as ID numbers and bank cards by configuring encryption rules in Spring or Spring Boot, eliminating manual SQL encryption and simplifying compliance for legacy systems.

JavaSQL MaskingShardingSphere
0 likes · 9 min read
Quick Start Guide to Data Encryption (Masking) with Apache ShardingSphere in Spring and Spring Boot
Java Architecture Diary
Java Architecture Diary
Jul 28, 2021 · Backend Development

Unlock Enterprise‑Level Data Handling with MyBatis‑Mate 1.0.1: Features & Code Guide

The release of MyBatis‑Mate 1.0.1 introduces enterprise‑grade features such as dictionary binding, field encryption, data desensitization, automatic DDL maintenance, and dynamic multi‑datasource sharding, accompanied by code examples, future roadmap, and Maven dependencies for seamless integration into Spring Boot projects.

DDLDictionary BindingJava
0 likes · 7 min read
Unlock Enterprise‑Level Data Handling with MyBatis‑Mate 1.0.1: Features & Code Guide
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
May 9, 2021 · Databases

Why ShardingSphere Encryption Blocks ShardingDataSource Creation and How to Fix It

This article explains how, in a Spring Boot 2.2.13 environment with ShardingSphere 4.0.1, enabling data encryption causes the expected ShardingDataSource bean not to be created, walks through the configuration and source code analysis, and provides a custom bean solution to resolve the issue.

JavaShardingSphereSpring Boot
0 likes · 5 min read
Why ShardingSphere Encryption Blocks ShardingDataSource Creation and How to Fix It
Beike Product & Technology
Beike Product & Technology
Mar 19, 2021 · Information Security

Key Management System (KMS) Overview and Common Cryptographic Security Risks

The article outlines typical cryptographic security risks such as weak algorithms, insufficient key lengths, poor key management, and then introduces a comprehensive Key Management System (KMS) architecture, its core functions, key hierarchy, and practical application scenarios like API signing and data encryption.

API signingKMScryptography
0 likes · 9 min read
Key Management System (KMS) Overview and Common Cryptographic Security Risks
Architects Research Society
Architects Research Society
Dec 27, 2017 · Information Security

Securing the Internet of Things: Challenges and a Four‑Step Approach

The article examines the growing security challenges of the Internet of Things, outlines a four‑step methodology for protecting devices and data, and highlights the difficulties enterprises face in managing and verifying billions of connected endpoints.

IoTdata encryptiondevice management
0 likes · 5 min read
Securing the Internet of Things: Challenges and a Four‑Step Approach