> Your essay is excellent. How would you apply similar protection to a > relational database? With postgres, I do a dump of the database (which can be done on a "live" system, you don't have to stop it to do a backup), compress the file with bzip2, calculate a ripemd-160 hash, and from there as outlined in the essay. Horst
- Re: tampering withelectronic health records Andrew po-jung Ho
- Re: tampering withelectronic health records Karsten . Hilbert
- Re: tampering withelectronic health records Horst Herb
- Re: tampering withelectronic health records Karsten . Hilbert
- Re: tampering withelectronic health records Andrew po-jung Ho
- Re: tampering withelectronic health records Andrew po-jung Ho
- Re: tampering withelectronic health records David Roseman, MD
- Re: tampering withelectronic health records Karsten . Hilbert
- Re: tampering withelectronic health records Horst Herb
- Re: tampering withelectronic health records Wayne Wilson
- Re: tampering withelectronic health records Horst Herb
- Re: tampering withelectronic health records Tim Cook
- Re: tampering withelectronic health records Horst Herb
