-
1
-
-
0003928313
-
-
Addison-Wesley
-
Abiteboul, S., Hull, R, Vianu, V.: Foundations of Databases, Addison-Wesley, 1995.
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
3
-
-
0001129020
-
Modal languages and bounded fragments of predicate logic
-
Andreka, H., Nemeti, I., van Benthem, J.: Modal languages and bounded fragments of predicate logic, Journal of Philosophical Logic 27,3 (1998), pp. 217-274.
-
(1998)
Journal of Philosophical Logic
, vol.27
, Issue.3
, pp. 217-274
-
-
Andreka, H.1
Nemeti, I.2
Van Benthem, J.3
-
4
-
-
0034174093
-
For unknown secrecies refusal is better than lying
-
Biskup, J.: For unknown secrecies refusal is better than lying, Data and Knowledge Engineering, 33 (2000), pp. 1-23.
-
(2000)
Data and Knowledge Engineering
, vol.33
, pp. 1-23
-
-
Biskup, J.1
-
5
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets, Data and Knowledge Engineering, 38 (2001), pp. 199-222.
-
(2001)
Data and Knowledge Engineering
, vol.38
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.A.2
-
6
-
-
0347756656
-
Controlled query evaluation for known policies by combining lying and refusal
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal, Annals of Mathematics and Artificial Intelligence, 40 (2004), pp. 37-62.
-
(2004)
Annals of Mathematics and Artificial Intelligence
, vol.40
, pp. 37-62
-
-
Biskup, J.1
Bonatti, P.A.2
-
7
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems, Int. Journal of Information Security 3,1 (2004), pp. 14-27.
-
(2004)
Int. Journal of Information Security
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
8
-
-
84902456527
-
Refusal in incomplete databases
-
Kluwer, Boston etc.
-
Biskup, J., Weibert, T.: Refusal in incomplete databases, Research Directions in Data and Applications Security XVII, Kluwer, Boston etc., 2004, pp. 143-157.
-
(2004)
Research Directions in Data and Applications Security XVII
, pp. 143-157
-
-
Biskup, J.1
Weibert, T.2
-
9
-
-
33745651873
-
Keeping secrets in incomplete databases
-
Chicago
-
Biskup, J., Weibert, T.: Keeping secrets in incomplete databases, Workshop on Foundations of Computer Security, LICS 05, http://www.cs.chalmers. se/~andrei/FCS05/, Chicago, 2005.
-
(2005)
Workshop on Foundations of Computer Security, LICS 05
-
-
Biskup, J.1
Weibert, T.2
-
10
-
-
0029324246
-
Foundations of secure deductive databases
-
Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of secure deductive databases, IEEE Transactions on Knowledge and Data Engineering 7,3 (1995), pp. 406-422.
-
(1995)
IEEE Transactions on Knowledge and Data Engineering
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.A.1
Kraus, S.2
Subrahmanian, V.S.3
-
11
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: constraints, inference channels, and monitoring disclosures, IEEE Transactions on Knowledge and Data Engineering 12,6 (2000), pp. 900-919.
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
12
-
-
84945905338
-
Constraints, inference channels and secure databases
-
Principles and Practice of Constraint Programming - CP 2000, 6th International Conference, Singapore, September 18-21, 2000. Springer, Berlin etc.
-
Brodsky, A., Farkas, C., Wijesekera, D., Wang, X. S.: Constraints, inference channels and secure databases, Principles and Practice of Constraint Programming - CP 2000, 6th International Conference, Singapore, September 18-21, 2000. Lecture Notes in Computer Science 1894, Springer, Berlin etc., 2000, pp. 98-113.
-
(2000)
Lecture Notes in Computer Science
, vol.1894
, pp. 98-113
-
-
Brodsky, A.1
Farkas, C.2
Wijesekera, D.3
Wang, X.S.4
-
14
-
-
0032690110
-
Minimal data upgrading to prevent inference and association attacks
-
Dawson, S., De Capitani di Vimercati, S., Lincoln, P., Samarati, P.: Minimal data upgrading to prevent inference and association attacks, Proc. of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), 1999, pp. 114-125.
-
(1999)
Proc. of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS)
, pp. 114-125
-
-
Dawson, S.1
De Capitani Di Vimercati, S.2
Lincoln, P.3
Samarati, P.4
-
15
-
-
84891376611
-
Specification and enforcement of classification and inference constraints
-
Dawson, S., De Capitani di Vimercati, S., Samarati, P.: Specification and enforcement of classification and inference constraints, IEEE Symposium on Security and Privacy 1999, pp. 181-195.
-
IEEE Symposium on Security and Privacy 1999
, pp. 181-195
-
-
Dawson, S.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
18
-
-
12244265258
-
The inference problem: A survey
-
Farkas, C., Jajodia, S.: The inference problem: a survey, ACM SIGKDD Explorations Newsletter 4,2 (2002), pp. 6-11.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
19
-
-
0039064922
-
On the restraining power of guards
-
Graedel, E.: On the restraining power of guards, Journal of Symbolic Logic 64,4 (1999), pp. 1719-1742.
-
(1999)
Journal of Symbolic Logic
, vol.64
, Issue.4
, pp. 1719-1742
-
-
Graedel, E.1
-
23
-
-
0020718929
-
Answering queries without revealing secrets
-
Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets, ACM Transactions on Database Systems 8,1 (1983), pp. 41-59.
-
(1983)
ACM Transactions on Database Systems
, vol.8
, Issue.1
, pp. 41-59
-
-
Sicherman, G.L.1
De Jonge, W.2
Van De Riet, R.P.3
-
24
-
-
0026367603
-
Controlling FD and MVD inferences in multilevel relational database systems
-
Su, T.A., Ozsoyoglu, G.: Controlling FD and MVD inferences in multilevel relational database systems. IEEE Trans. on Knowledge and Data Engineering, 3(4):474-485, (1991).
-
(1991)
IEEE Trans. on Knowledge and Data Engineering
, vol.3
, Issue.4
, pp. 474-485
-
-
Su, T.A.1
Ozsoyoglu, G.2
-
25
-
-
0028720693
-
Formal query languages for secure relational databases
-
Winslett, M, Smith, K., Qian, X.: Formal query languages for secure relational databases, ACM Transactions on Database Systems 19,4 (1994), pp. 626-662.
-
(1994)
ACM Transactions on Database Systems
, vol.19
, Issue.4
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
|