메뉴 건너뛰기




Volumn 12, Issue 6, 2000, Pages 900-919

Secure databases: constraints, inference channels, and monitoring disclosures

Author keywords

[No Author keywords available]

Indexed keywords

COMPLETENESS; DATA CONFIDENTIALITY; DECIDABILITY; DISCLOSURE INFERENCE ENGINE; DISCLOSURE MONITOR; INFERENCE CHANNELS; MULTILEVEL SECURITY; SOUNDNESS;

EID: 0034314077     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/69.895801     Document Type: Article
Times cited : (122)

References (19)
  • 2
    • 0007938807 scopus 로고
    • Database Inference Controller
    • D.L. Spooner and C. Landwehr, eds.
    • L.J. Buczkowski, "Database Inference Controller," Database Security III: Status and Prospects, D.L. Spooner and C. Landwehr, eds., pp. 311-322, 1990.
    • (1990) Database Security III: Status and Prospects , pp. 311-322
    • Buczkowski, L.J.1
  • 5
    • 84937407052 scopus 로고
    • Commutative Filters for Reducing Inference Threats in Multilevel Database Systems
    • D.E. Denning, "Commutative Filters for Reducing Inference Threats in Multilevel Database Systems," Proc. IEEE Symp. Security and Privacy, pp. 134-146, 1985.
    • (1985) Proc. IEEE Symp. Security and Privacy , pp. 134-146
    • Denning, D.E.1
  • 7
    • 0023861339 scopus 로고
    • Inference Aggregation Detection in Database Management Systems
    • T.H. Hinke, "Inference Aggregation Detection in Database Management Systems," Proc. IEEE Symp. Security and Privacy, pp. 96-106, 1988.
    • (1988) Proc. IEEE Symp. Security and Privacy , pp. 96-106
    • Hinke, T.H.1
  • 8
    • 0007664281 scopus 로고
    • Inference Problems in Multilevel Secure Database Management Systems
    • M.D. Abrams, S. Jajodia, and H. Podell, eds., Los Alamitos, Cailf.: IEEE CS Press
    • S. Jajodia and C. Meadows, "Inference Problems in Multilevel Secure Database Management Systems," Information Security: An Integrated Collection of Essays, M.D. Abrams, S. Jajodia, and H. Podell, eds., pp. 570-584, Los Alamitos, Cailf.: IEEE CS Press, 1995.
    • (1995) Information Security: An Integrated Collection of Essays , pp. 570-584
    • Jajodia, S.1    Meadows, C.2
  • 9
    • 0030084794 scopus 로고    scopus 로고
    • Inference in MLS Database Systems
    • Feb.
    • D.G. Marks, "Inference in MLS Database Systems," IEEE Trans. Knowledge and Data Eng., vol. 8, no. 1, pp. 46-55, Feb. 1996.
    • (1996) IEEE Trans. Knowledge and Data Eng. , vol.8 , Issue.1 , pp. 46-55
    • Marks, D.G.1
  • 12
    • 0025135715 scopus 로고
    • Extending the Brewer-Nash Model to a Multilevel Context
    • C. Meadows, "Extending the Brewer-Nash Model to a Multilevel Context," Proc. IEEE Symp. Security and Privacy, pp. 95-102, 1990.
    • (1990) Proc. IEEE Symp. Security and Privacy , pp. 95-102
    • Meadows, C.1
  • 13
    • 0023830194 scopus 로고
    • Controlling Logical Inference in Multilevel Database Systems
    • M. Morgenstern, "Controlling Logical Inference in Multilevel Database Systems," Proc. IEEE Symp. Security and Privacy, pp. 245-255, 1988.
    • (1988) Proc. IEEE Symp. Security and Privacy , pp. 245-255
    • Morgenstern, M.1
  • 15
    • 0025447566 scopus 로고
    • Design of LDV: A Multilevel Secure Relational Database Management System
    • June
    • P.D. Stachour and B. Thuraisingham, "Design of LDV: A Multilevel Secure Relational Database Management System," IEEE Trans. Knowledge and Data Eng., vol. 2, no. 2, pp. 190-209, June 1990.
    • (1990) IEEE Trans. Knowledge and Data Eng. , vol.2 , Issue.2 , pp. 190-209
    • Stachour, P.D.1    Thuraisingham, B.2
  • 16
    • 0026367603 scopus 로고
    • Inference in MLS Database Systems
    • Dec.
    • T. Su and G. Ozsoyoglu, "Inference in MLS Database Systems," IEEE Trans. Knowledge and Data Eng., vol. 3, no. 4, pp. 474-485, Dec. 1991.
    • (1991) IEEE Trans. Knowledge and Data Eng. , vol.3 , Issue.4 , pp. 474-485
    • Su, T.1    Ozsoyoglu, G.2
  • 17
    • 84974776829 scopus 로고
    • A Fast Algorithm for Detecting Second Paths in Database Inference Analysis
    • T.H. Hinke, H.S. Delugach, and A. Chandrasekhar, "A Fast Algorithm for Detecting Second Paths in Database Inference Analysis," J. Computer Security, vol. 3, nos. 2 and 3, pp. 147-168, 1995.
    • (1995) J. Computer Security , vol.3 , Issue.2-3 , pp. 147-168
    • Hinke, T.H.1    Delugach, H.S.2    Chandrasekhar, A.3
  • 18
    • 0038896772 scopus 로고
    • Security Checking in Relational Database Management Systems Augmented with Inference Engines
    • B.M. Thuraisingham, "Security Checking in Relational Database Management Systems Augmented with Inference Engines," Computers and Security, vol. 6, pp. 479-492, 1987.
    • (1987) Computers and Security , vol.6 , pp. 479-492
    • Thuraisingham, B.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.