메뉴 건너뛰기




Volumn 64, Issue 3, 2002, Pages 496-541

Maximizing sharing of protected information

Author keywords

Constraint solving; Data classification; Data inference; Lattice; Privacy; Security

Indexed keywords

ALGORITHMS; CONSTRAINT THEORY; COSTS; DATA ACQUISITION; DATA DESCRIPTION; INFORMATION ANALYSIS; LATTICE CONSTANTS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 3042717763     PISSN: 00220000     EISSN: None     Source Type: Journal    
DOI: 10.1006/jcss.2001.1807     Document Type: Conference Paper
Times cited : (22)

References (38)
  • 2
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • The Mitre Corporation, March
    • D. E. Bell and L. J. LaPadula, Secure computer systems: Unified exposition and Multics interpretation, Technical report, The Mitre Corporation, March 1976.
    • (1976) Technical Report
    • Bell, D.E.1    LaPadula, L.J.2
  • 7
    • 0030085404 scopus 로고    scopus 로고
    • Wizard: A database inference analysis and detection system
    • H. S. Delugach and T. H. Hinke, Wizard: A database inference analysis and detection system, IEEE Trans. Knowledge Data Engrg. 8 (1996), 56-66.
    • (1996) IEEE Trans. Knowledge Data Engrg. , vol.8 , pp. 56-66
    • Delugach, H.S.1    Hinke, T.H.2
  • 8
    • 85030825941 scopus 로고    scopus 로고
    • Department of Defense, National Computer Security Center, "Department of Defense Trusted Computer System Evaluation Criteria," Standard DOD 5200.28-STD, 1985
    • Department of Defense, National Computer Security Center, "Department of Defense Trusted Computer System Evaluation Criteria," Standard DOD 5200.28-STD, 1985.
  • 9
    • 0028518126 scopus 로고
    • A space-and-time-efficient coding algorithm for lattice computations
    • D. D. Ganguly, C. K. Mohan, and S. Ranka, A space-and-time-efficient coding algorithm for lattice computations, IEEE Trans. Knowledge Data Engrg. 6 (1994), 819-829.
    • (1994) IEEE Trans. Knowledge Data Engrg. , vol.6 , pp. 819-829
    • Ganguly, D.D.1    Mohan, C.K.2    Ranka, S.3
  • 10
    • 0009431182 scopus 로고
    • The LDV secure relational DBMS model
    • S. Jajodia and C. E. Landwehr, Eds., North-Holland, Amsterdam
    • J. T. Haigh, R. C. O'Brien, and D. J. Thomsen, The LDV secure relational DBMS model, in "Database Security, IV: Status and Prospects" (S. Jajodia and C. E. Landwehr, Eds.), pp. 265-279, North-Holland, Amsterdam, 1991.
    • (1991) Database Security, IV: Status and Prospects , pp. 265-279
    • Haigh, J.T.1    O'Brien, R.C.2    Thomsen, D.J.3
  • 11
    • 0030681774 scopus 로고    scopus 로고
    • Catalytic inference analysis: Detecting inference threats due to knowledge discovery
    • Oakland, CA, May
    • J. Hale and S. Shenoi, Catalytic inference analysis: Detecting inference threats due to knowledge discovery, in "Proc. of the 1997 IEEE Symposium on Security and Privacy," pp. 188-199, Oakland, CA, May 1997.
    • (1997) Proc. of the 1997 IEEE Symposium on Security and Privacy , pp. 188-199
    • Hale, J.1    Shenoi, S.2
  • 12
    • 0023861339 scopus 로고
    • Inference aggregation detection in database management systems
    • Oakland, CA, April
    • T. Hinke, Inference aggregation detection in database management systems, in "Proc. of the IEEE Symposium on Research in Security and Privacy, " pp. 96-107, Oakland, CA, April 1988.
    • (1988) Proc. of the IEEE Symposium on Research in Security and Privacy , pp. 96-107
    • Hinke, T.1
  • 13
    • 0007664281 scopus 로고
    • Inference problems in multilevel secure database management systems
    • M. D. Abrams, S. Jajodia, and H. J. Podell, Eds., IEEE Computer Society Press, Los Alamitos, CA
    • S. Jajodia and C. Meadows, Inference problems in multilevel secure database management systems, in "Information Security - An Integrated Collection of Essays" (M. D. Abrams, S. Jajodia, and H. J. Podell, Eds.), pp. 570-584, IEEE Computer Society Press, Los Alamitos, CA, 1995.
    • (1995) Information Security - An Integrated Collection of Essays , pp. 570-584
    • Jajodia, S.1    Meadows, C.2
  • 15
    • 0024663399 scopus 로고
    • Aggregation and inference: Facts and fallacies
    • Oakland, CA, May
    • T. F. Lunt, Aggregation and inference: Facts and fallacies, in "Proc. of the IEEE Symposium on Security and Privacy," pp. 102-109, Oakland, CA, May 1989.
    • (1989) Proc. of the IEEE Symposium on Security and Privacy , pp. 102-109
    • Lunt, T.F.1
  • 19
    • 10644286156 scopus 로고
    • Models of multilevel computer security
    • The Mitre Corporation
    • J. K. Millen, Models of multilevel computer security, Technical Report MTR-10537, The Mitre Corporation, 1989. Also in Adv. Comput. 29 (1989), 1-45.
    • (1989) Technical Report MTR-10537
    • Millen, J.K.1
  • 20
    • 10644230604 scopus 로고
    • J. K. Millen, Models of multilevel computer security, Technical Report MTR-10537, The Mitre Corporation, 1989. Also in Adv. Comput. 29 (1989), 1-45.
    • (1989) Adv. Comput. , vol.29 , pp. 1-45
  • 21
    • 84976785631 scopus 로고
    • Security and inference in multilevel database and knowledge-base systems
    • San Francisco, CA, May
    • M. Morgenstern, Security and inference in multilevel database and knowledge-base systems, in "Proc. of the 1987 ACM SIGMOD Conference," pp. 357-373, San Francisco, CA, May 1987.
    • (1987) Proc. of the 1987 ACM SIGMOD Conference , pp. 357-373
    • Morgenstern, M.1
  • 23
    • 0030281821 scopus 로고    scopus 로고
    • Satisfiability of inequalities in a poset
    • V. R. Pratt and J. Tiuryn, Satisfiability of inequalities in a poset, Fund. Inform. 28 (1996), 165-182.
    • (1996) Fund. Inform. , vol.28 , pp. 165-182
    • Pratt, V.R.1    Tiuryn, J.2
  • 24
    • 0030087497 scopus 로고    scopus 로고
    • A MAC policy framework for multilevel relational databases
    • X. Qian and T. F. Lunt, A MAC policy framework for multilevel relational databases, IEEE Trans. Knowledge Data Engrg. 8 (1996), 1-14.
    • (1996) IEEE Trans. Knowledge Data Engrg. , vol.8 , pp. 1-14
    • Qian, X.1    Lunt, T.F.2
  • 26
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • Foundations of Security Analysis and Design R. Focardi and R. Gorrieri, Eds., Springer-Verlag, Berlin
    • P. Samarati and S. De Capitani di Vimercati, Access control: Policies, models, and mechanisms, in "Foundations of Security Analysis and Design" (R. Focardi and R. Gorrieri, Eds.), Lecture Notes of Computer Science 2171, Springer-Verlag, Berlin, 2001.
    • (2001) Lecture Notes of Computer Science , vol.2171
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 31
    • 0026367603 scopus 로고
    • Controlling FD and MVD inferences in multilevel relational database systems
    • T. A. Su and G. Ozsoyoglu, Controlling FD and MVD inferences in multilevel relational database systems, IEEE Trans. Knowledge Data Engrg. 3 (1991), 474-485.
    • (1991) IEEE Trans. Knowledge Data Engrg. , vol.3 , pp. 474-485
    • Su, T.A.1    Ozsoyoglu, G.2
  • 32
    • 0031118370 scopus 로고    scopus 로고
    • A data structure for lattice representation
    • M. Talamo and P. Vocca, A data structure for lattice representation, Theoret. Comput. Sci. 175 (1997), 373-392.
    • (1997) Theoret. Comput. Sci. , vol.175 , pp. 373-392
    • Talamo, M.1    Vocca, P.2
  • 33
    • 0001790593 scopus 로고
    • Depth-first search and linear graph algorithms
    • R. Tarjan, Depth-first search and linear graph algorithms, SIAM J. Comput. 1 (1972), 146-160.
    • (1972) SIAM J. Comput. , vol.1 , pp. 146-160
    • Tarjan, R.1
  • 34
    • 8844262749 scopus 로고
    • The use of conceptual structures for handling the inference problem
    • C. E. Landwehr and S. Jajodia, Eds., North-Holland, Amsterdam
    • B. Thuraisingham, The use of conceptual structures for handling the inference problem, in "Database Security, V: Status and Prospects" (C. E. Landwehr and S. Jajodia, Eds.), pp. 333-362, North-Holland, Amsterdam, 1992.
    • (1992) Database Security, V: Status and Prospects , pp. 333-362
    • Thuraisingham, B.1
  • 35
    • 0029290760 scopus 로고
    • Security constraint processing in a multilevel secure distributed database management system
    • B. Thuraisingham and W. Ford, Security constraint processing in a multilevel secure distributed database management system, IEEE Trans. Knowledge Data Engrg. 7 (1995), 274-293.
    • (1995) IEEE Trans. Knowledge Data Engrg. , vol.7 , pp. 274-293
    • Thuraisingham, B.1    Ford, W.2
  • 36
    • 0031232552 scopus 로고    scopus 로고
    • The conceptual basis for mediation services
    • G. Wiederhold and M. Genesereth, The conceptual basis for mediation services, IEEE Expert 12 (1997), 38-47.
    • (1997) IEEE Expert , vol.12 , pp. 38-47
    • Wiederhold, G.1    Genesereth, M.2
  • 37
    • 0028720693 scopus 로고
    • Formal query languages for secure relational databases
    • M. Winslett, K. Smith, and X. Qian, Formal query languages for secure relational databases, ACM Trans. Database Systems 19 (1994), 626-662.
    • (1994) ACM Trans. Database Systems , vol.19 , pp. 626-662
    • Winslett, M.1    Smith, K.2    Qian, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.