-
1
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosure
-
November
-
A. Brodsky, C. Farkas, and S. Jajodia. Secure databases: Constraints, inference channels, and monitoring disclosure. IEEE Trans. Knowledge and Data Eng., November, 2000.
-
(2000)
IEEE Trans. Knowledge and Data Eng.
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
2
-
-
0007938807
-
Database inference controller
-
D.L. Spooner and C. Landwehr, editors, North-Holland, Amsterdam
-
L.J. Buczkowski. Database inference controller. In D.L. Spooner and C. Landwehr, editors, Database Security III: Status and Prospects, pages 311-322. North-Holland, Amsterdam, 1990.
-
(1990)
Database Security III: Status and Prospects
, pp. 311-322
-
-
Buczkowski, L.J.1
-
3
-
-
84891376611
-
Specification and enforcement of classification and inference constraints
-
May 9-12
-
S. Dawson, S.De Capitani di Vimercati, and P. Samarati. Specification and enforcement of classification and inference constraints. In Proc. of the 20th IEEE Symposium on Security and Privacy, Oakland, CA, May 9-12 1999.
-
(1999)
Proc. of the 20th IEEE Symposium on Security and Privacy, Oakland, CA
-
-
Dawson, S.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
4
-
-
84937407052
-
Commutative filters for reducing inference threats in multilevel database systems
-
D.E. Denning. Commutative filters for reducing inference threats in multilevel database systems. In Proc. IEEE Symp. on Security and Privacy, pages 134-146, 1985.
-
(1985)
Proc. IEEE Symp. on Security and Privacy
, pp. 134-146
-
-
Denning, D.E.1
-
5
-
-
12244265258
-
The inference problem: A survey
-
C. Farkas and S. Jajodia. The inference problem: a survey. SIGKDD Explor. Newsl., 4(2):6-11, 2002.
-
(2002)
SIGKDD Explor. Newsl.
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
8
-
-
0023861339
-
Inference aggregation detection in database management systems
-
T.H. Hinke. Inference aggregation detection in database management systems. In Proc. IEEE Symp. on Security and Privacy, pages 96-106, 1988.
-
(1988)
Proc. IEEE Symp. on Security and Privacy
, pp. 96-106
-
-
Hinke, T.H.1
-
9
-
-
0007664281
-
Inference problems in multilevel secure database management systems
-
M.D. Abrams, S. Jajodia, and H. Podell, editors, IEEE Computer Society Press, Los Alamitos, Calif.
-
S. Jajodia and C. Meadows. Inference problems in multilevel secure database management systems. In M.D. Abrams, S. Jajodia, and H. Podell, editors, Information Security: An integrated collection of essays, pages 570-584. IEEE Computer Society Press, Los Alamitos, Calif., 1995.
-
(1995)
Information Security: An Integrated Collection of Essays
, pp. 570-584
-
-
Jajodia, S.1
Meadows, C.2
-
11
-
-
0030084794
-
Inference in MLS database systems
-
February
-
D.G. Marks. Inference in MLS database systems. IEEE Trans. Knowledge and Data Eng., 8(1):46-55, February 1996.
-
(1996)
IEEE Trans. Knowledge and Data Eng.
, vol.8
, Issue.1
, pp. 46-55
-
-
Marks, D.G.1
-
12
-
-
84949777168
-
Enhancing the controlled disclosure of sensitive information
-
Springer-Verlag Lecture Notes in Computer Science
-
D.G. Marks, A. Motro, and S. Jajodia. Enhancing the controlled disclosure of sensitive information. In Proc. European Symp. on Research in Computer Security, Springer-Verlag Lecture Notes in Computer Science, Vol. 1146, pages 290-303, 1996.
-
(1996)
Proc. European Symp. on Research in Computer Security
, vol.1146
, pp. 290-303
-
-
Marks, D.G.1
Motro, A.2
Jajodia, S.3
-
14
-
-
0023830194
-
Controlling logical inference in multilevel database systems
-
M. Morgenstern. Controlling logical inference in multilevel database systems. In Proc. IEEE Symp. on Security and Privacy, pages 245-255, 1988.
-
(1988)
Proc. IEEE Symp. on Security and Privacy
, pp. 245-255
-
-
Morgenstern, M.1
-
16
-
-
0025447566
-
Design of LDV: A multilevel secure relational database management system
-
June
-
P.D. Stachour and B. Thuraisingham. Design of LDV: A multilevel secure relational database management system. IEEE Trans. Knowledge and Data Eng., 2(2):190-209, June 1990.
-
(1990)
IEEE Trans. Knowledge and Data Eng.
, vol.2
, Issue.2
, pp. 190-209
-
-
Stachour, P.D.1
Thuraisingham, B.2
-
18
-
-
84974776829
-
A fast algorithm for detecting second paths in database inference analysis
-
T.H.Hinke, Harry S. Delugach, and Asha Chandrasekhar. A fast algorithm for detecting second paths in database inference analysis. Jour, of Computer Security, 3(2,3):147-168, 1995.
-
(1995)
Jour, of Computer Security
, vol.3
, Issue.2-3
, pp. 147-168
-
-
Hinke, T.H.1
Delugach, H.S.2
Chandrasekhar, A.3
-
19
-
-
0038896772
-
Security checking in relational database management systems augmented with inference engines
-
B.M. Thuraisingham. Security checking in relational database management systems augmented with inference engines. Computers and Security, 6:479-492, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 479-492
-
-
Thuraisingham, B.M.1
-
20
-
-
85040876697
-
-
Computer Science Press, Rockville, MD
-
J.D. Ullman. Principles of Database and Knowledge-base Systems, Volumes 1,2. Computer Science Press, Rockville, MD, 1988.
-
(1988)
Principles of Database and Knowledge-base Systems, Volumes 1,2
, vol.1-2
-
-
Ullman, J.D.1
|