메뉴 건너뛰기




Volumn 176, Issue 22, 2006, Pages 3269-3299

Unauthorized inferences in semistructured databases

Author keywords

Completeness; Entailment; Inference problem; Privacy; Semistructured data; Soundness

Indexed keywords

ALGORITHMS; CONSTRAINT THEORY; CONTROL SYSTEMS; DATA PRIVACY; DATA STRUCTURES; INFORMATION ANALYSIS; QUERY LANGUAGES;

EID: 33747774836     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2006.01.004     Document Type: Article
Times cited : (8)

References (77)
  • 1
    • 84948972435 scopus 로고    scopus 로고
    • S. Abiteboul, Querying semi-structured data, in: ICDT, 1997, pp. 1-18.
  • 2
    • 0041783510 scopus 로고    scopus 로고
    • R. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, 2000, pp. 439-450.
  • 3
    • 0031209934 scopus 로고    scopus 로고
    • Clearing the way for physicians' use of clinical information systems
    • Anderson J.G. Clearing the way for physicians' use of clinical information systems. Commun. ACM 40 8 (1997) 83-90
    • (1997) Commun. ACM , vol.40 , Issue.8 , pp. 83-90
    • Anderson, J.G.1
  • 4
    • 33747781566 scopus 로고    scopus 로고
    • D.E. Bell, L.J. LaPadula, Secure computer systems: Mathematical foundation and model, Technical Report, Mitre Corp. Report No. M74-244, Bedford, Mass., 1975.
  • 5
    • 33747804795 scopus 로고    scopus 로고
    • S. Benferhat, F. Autrel, F. Cuppens, A possibilistic logic encoding of access control, in: FLAIRS Conf., 2003, pp. 481-485.
  • 6
    • 0242625192 scopus 로고    scopus 로고
    • S. Benferhat, R.E. Baida, F. Cuppens, A stratification-based approach for handling conflicts in access control, in: SACMAT, 2003, pp. 189-195.
  • 7
    • 84989880098 scopus 로고    scopus 로고
    • E. Bertino, S. Castano, E. Ferrari, M. Mesiti, Controlled access and dissemination of XML documents, in: Workshop on Web Information and Data Management, 1999, pp. 22-27.
  • 9
    • 0024868341 scopus 로고    scopus 로고
    • J. Biskup, H.H. Bruggemann, The personal model of data - towards a privacy oriented information system (extended abstract), in: Proceedings of the Fifth International Conference of Data Engineering, February 6-10, 1989, Los Angeles, California, USA, IEEE Computer Society, 1989, pp. 348-355.
  • 10
    • 0029686313 scopus 로고    scopus 로고
    • National health information privacy bill generates heat at SCAMC
    • Braithwaite B. National health information privacy bill generates heat at SCAMC. J. Amer. Informat. Assoc. 3 1 (1996) 95-96
    • (1996) J. Amer. Informat. Assoc. , vol.3 , Issue.1 , pp. 95-96
    • Braithwaite, B.1
  • 11
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosure
    • Brodsky A., Farkas C., and Jajodia S. Secure databases: Constraints, inference channels, and monitoring disclosure. IEEE Trans. Knowledge Data Eng. 12 6 (2000) 900-919
    • (2000) IEEE Trans. Knowledge Data Eng. , vol.12 , Issue.6 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 12
    • 0007938807 scopus 로고
    • Database inference controller
    • Spooner D.L., and Landwehr C. (Eds), North-Holland, Amsterdam
    • Buczkowski L.J. Database inference controller. In: Spooner D.L., and Landwehr C. (Eds). Database Security III: Status and Prospects (1990), North-Holland, Amsterdam 311-322
    • (1990) Database Security III: Status and Prospects , pp. 311-322
    • Buczkowski, L.J.1
  • 13
    • 0030156981 scopus 로고    scopus 로고
    • P. Buneman, S. Davidson, G. Hillebrand, D. Suciu, A query language and optimization techniques for unstructured data, in: Proceedings of ACM SIGMOD International Conference on Management of Data, 1996, pp. 505-516.
  • 14
    • 0040748335 scopus 로고    scopus 로고
    • Constraints for semi-structured data and XML
    • Buneman P., Fan W., Simeon J., and Weinstein S. Constraints for semi-structured data and XML. SIGMOD Record 30 1 (2001) 47-54
    • (2001) SIGMOD Record , vol.30 , Issue.1 , pp. 47-54
    • Buneman, P.1    Fan, W.2    Simeon, J.3    Weinstein, S.4
  • 16
    • 0034294211 scopus 로고    scopus 로고
    • Path constraints in semistructured databases
    • Buneman P., Fan W., and Weinstein S. Path constraints in semistructured databases. J. Comput. System Sci. 61 2 (2000) 146-193
    • (2000) J. Comput. System Sci. , vol.61 , Issue.2 , pp. 146-193
    • Buneman, P.1    Fan, W.2    Weinstein, S.3
  • 17
    • 9544223206 scopus 로고    scopus 로고
    • A web-based spatial data access system using semantic r-trees
    • Chen S., Wang X., Rishe N., and Weiss M.A. A web-based spatial data access system using semantic r-trees. Informat. Sci. 167 (2004) 41-61
    • (2004) Informat. Sci. , vol.167 , pp. 41-61
    • Chen, S.1    Wang, X.2    Rishe, N.3    Weiss, M.A.4
  • 18
    • 0017943805 scopus 로고
    • Security in statistical databases for queries with small counts
    • Chin F.Y. Security in statistical databases for queries with small counts. ACM Trans. Database Syst. 3 1 (1978) 92-104
    • (1978) ACM Trans. Database Syst. , vol.3 , Issue.1 , pp. 92-104
    • Chin, F.Y.1
  • 19
    • 0030658435 scopus 로고    scopus 로고
    • L. Cholvy, F. Cuppens, C. Saurel, Towards a logical formalization of responsibility, in: ICAIL, 1997, pp. 233-242.
  • 20
    • 33747750700 scopus 로고    scopus 로고
    • C. Clifton, M. Kantarcioglu, J. Vaidya, Defining privacy for data mining, in: Proceedings of the National Science Foundation Workshop on Next Generation Data Mining, Baltimore, MD, 2002, pp. 126-133.
  • 22
    • 33747795754 scopus 로고    scopus 로고
    • National Research Council, For the record: Protecting electronic health information, Technical Report, National Academy of Sciences, 1997.
  • 23
    • 33747796789 scopus 로고    scopus 로고
    • F. Cuppens, R. Demolomba, A deontic logic for reasoning about confidentiality, in: Proceedings of 3rd International Workshop on Deontic Logic in Computer Science, 1996.
  • 24
    • 84947730526 scopus 로고    scopus 로고
    • F. Cuppens, R. Demolomba, A modal logical framework for security policies, in: ISMIS, 1997, pp. 579-589.
  • 26
    • 0032690110 scopus 로고    scopus 로고
    • S. Dawson, S. De Capitani di Vimercati, P. Samarati, Minimal data upgrating to prevent inference and association attacks, in: Proceedings of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 1999, pp. 114-125.
  • 27
    • 0032657567 scopus 로고    scopus 로고
    • S. Dawson, S. De Capitani di Vimercati, P. Samarati, Specification and enforcement of classification and inference constraints, in: Proceedings of IEEE Symposium on Security and Privacy, 1999.
  • 29
    • 84937407052 scopus 로고    scopus 로고
    • D.E. Denning, Commutative filters for reducing inference threats in multilevel database systems, in: Proceedings of IEEE Symposium on Security and Privacy, 1985, pp. 134-146.
  • 31
    • 0018998235 scopus 로고
    • A fast procedure for finding a tracker in a statistical database
    • Dennning D.E., and Schlorer J. A fast procedure for finding a tracker in a statistical database. ACM Trans. Database Syst. 5 1 (1980) 88-102
    • (1980) ACM Trans. Database Syst. , vol.5 , Issue.1 , pp. 88-102
    • Dennning, D.E.1    Schlorer, J.2
  • 32
    • 0018444418 scopus 로고
    • Secure databases: Protection against user influence
    • Dobkin D., Jones A.K., and Lipton R.J. Secure databases: Protection against user influence. ACM Trans. Database Syst. 4 1 (1979) 97-106
    • (1979) ACM Trans. Database Syst. , vol.4 , Issue.1 , pp. 97-106
    • Dobkin, D.1    Jones, A.K.2    Lipton, R.J.3
  • 33
    • 33747806416 scopus 로고    scopus 로고
    • L.C.J. Dreyer, M.S. Olivier, Dynamic aspect of the infopriv model, in: Proceedings of 9th Database and Expert Systems Applications DEXA 98, IEEE Computer Society, Los Alamitos, 1998, pp. 340-345.
  • 34
    • 0021177508 scopus 로고    scopus 로고
    • J.A. Goguen, J. Meseguer, Unwinding and inference control, in: Proceedings of IEEE Symposium on Security and Privacy, 1984, pp. 75-86.
  • 35
    • 0023861339 scopus 로고    scopus 로고
    • T.H. Hinke, Inference aggregation detection in database management systems, in: Proceedings of IEEE Symposium on Security and Privacy, 1988, pp. 96-106.
  • 36
    • 84945313583 scopus 로고    scopus 로고
    • Quantifying privacy leakage through answering database queries
    • Proceedings of 5th Information Security Conference (ISC), Springer-Verlag
    • Hsu T.S., Liau C.J., Wang D.W., and Chen J.K. Quantifying privacy leakage through answering database queries. Proceedings of 5th Information Security Conference (ISC). LNCS 2433 (2002), Springer-Verlag 162-175
    • (2002) LNCS , vol.2433 , pp. 162-175
    • Hsu, T.S.1    Liau, C.J.2    Wang, D.W.3    Chen, J.K.4
  • 37
    • 84947296768 scopus 로고    scopus 로고
    • A logical model for privacy protection
    • Proceedings of 4th Information Security Conference (ISC), Springer-Verlag
    • Hsu T.S., Liau C.J., and Wang D.W. A logical model for privacy protection. Proceedings of 4th Information Security Conference (ISC). LNCS 2200 (2001), Springer-Verlag 110-124
    • (2001) LNCS , vol.2200 , pp. 110-124
    • Hsu, T.S.1    Liau, C.J.2    Wang, D.W.3
  • 38
    • 0007664281 scopus 로고
    • Inference problems in multilevel secure database management systems
    • Abrams M.D., Jajodia S., and Podell H. (Eds), IEEE Computer Society Press, Los Alamitos, Calif.
    • Jajodia S., and Meadows C. Inference problems in multilevel secure database management systems. In: Abrams M.D., Jajodia S., and Podell H. (Eds). Information Security: An Integrated Collection of Essays (1995), IEEE Computer Society Press, Los Alamitos, Calif. 570-584
    • (1995) Information Security: An Integrated Collection of Essays , pp. 570-584
    • Jajodia, S.1    Meadows, C.2
  • 40
    • 1842510810 scopus 로고
    • A model of statistical databases and their security
    • Kam J.B., and Ullman J. A model of statistical databases and their security. ACM Trans. Database Syst. 2 1 (1977) 1-10
    • (1977) ACM Trans. Database Syst. , vol.2 , Issue.1 , pp. 1-10
    • Kam, J.B.1    Ullman, J.2
  • 41
    • 0034450091 scopus 로고    scopus 로고
    • M. Kudo, S. Hada, XML document security based on provisional authorization, in: Proceedings of the 7th ACM Conference on Computer and Communication Security, November 2000.
  • 43
    • 0030084794 scopus 로고    scopus 로고
    • Inference in MLS database systems
    • Marks D.G. Inference in MLS database systems. IEEE Trans. Knowledge Data Eng. 8 1 (1996) 46-55
    • (1996) IEEE Trans. Knowledge Data Eng. , vol.8 , Issue.1 , pp. 46-55
    • Marks, D.G.1
  • 44
    • 85119629832 scopus 로고    scopus 로고
    • S. Mazumdar, D. Stemple, T. Sheard, Resolving the tension between integrity and security using a theorem prover, in: Proceedings of ACM International Conference on Management of Data, 1988, pp. 233-242.
  • 45
    • 0346789280 scopus 로고    scopus 로고
    • Lore: A database management system for semistructured data
    • McHugh J., Abiteboul S., Goldman R., Quass D., and Widom J. Lore: A database management system for semistructured data. SIGMOD Rec. 26 3 (1997) 54-66
    • (1997) SIGMOD Rec. , vol.26 , Issue.3 , pp. 54-66
    • McHugh, J.1    Abiteboul, S.2    Goldman, R.3    Quass, D.4    Widom, J.5
  • 46
    • 0025135715 scopus 로고    scopus 로고
    • C. Meadows, Extending the Brewer-Nash model to a multilevel context, in: Proceedings of IEEE Symposium on Security and Privacy, 1990, pp. 95-102.
  • 47
    • 33747793825 scopus 로고    scopus 로고
    • Privacy lost, anytime, anywhere
    • Meeks B.N. Privacy lost, anytime, anywhere. Communications of ACM 40/8 (1997) 11-13
    • (1997) Communications of ACM , vol.40-8 , pp. 11-13
    • Meeks, B.N.1
  • 48
    • 0023830194 scopus 로고    scopus 로고
    • M. Morgenstern, Controlling logical inference in multilevel database systems, in: Proceedings of IEEE Symposium on Security and Privacy, 1988, pp. 245-255.
  • 49
    • 33747765682 scopus 로고    scopus 로고
    • Department of Justice, Genetic information and the workplace, Technical Report, Department of Labor, Department of Health and Human Services, Equal Employment Opportunity Commission Department of Justice, 1998.
  • 50
    • 33747797142 scopus 로고    scopus 로고
    • United States General Accounting Office, Medical records privacy, access needed for health research, but oversight of privacy protections is limited, Technical Report, United States General Accounting Office, Report to Congressional Requesters GAO/HEHS-99-55, 1999.
  • 51
    • 1542412446 scopus 로고
    • Some privacy issues in knowledge discovery: Oecd personal privacy guidelines
    • O'Leary D.E. Some privacy issues in knowledge discovery: Oecd personal privacy guidelines. IEEE Expert/Intell. Syst. Appl. 10 2 (1995)
    • (1995) IEEE Expert/Intell. Syst. Appl. , vol.10 , Issue.2
    • O'Leary, D.E.1
  • 52
    • 33747758852 scopus 로고    scopus 로고
    • S.R.M. Oliveira, O.R. Zaiane, Privacy preserving clustering by data transformation, in: Proceedings of the 18th Brazilian Symposium on Databases, Brazil, 2003, pp. 304-318.
  • 53
    • 7444225924 scopus 로고    scopus 로고
    • S.R.M. Oliveira, O.R. Zaiane, Y. Saygin, Secure association rule mining, in: Proceedings of the 8th Pacific-Asian Conference on Knowledge Discovery and Data Mining, Sydney, Australia, 2004, pp. 74-85.
  • 54
    • 0002779304 scopus 로고    scopus 로고
    • Privacy, information technology, and health care
    • Rindfleisch T.C. Privacy, information technology, and health care. Commun. ACM 40 8 (1997) 93-100
    • (1997) Commun. ACM , vol.40 , Issue.8 , pp. 93-100
    • Rindfleisch, T.C.1
  • 55
    • 0037391445 scopus 로고    scopus 로고
    • Human exploration and development of space: using xml database space wide web: Space wide web by adapters in distributed systems configuration from reusable components
    • Rine D. Human exploration and development of space: using xml database space wide web: Space wide web by adapters in distributed systems configuration from reusable components. Informat. Sci. 150 (2003) 123-151
    • (2003) Informat. Sci. , vol.150 , pp. 123-151
    • Rine, D.1
  • 57
    • 0033652039 scopus 로고    scopus 로고
    • R. Sandhu, D. Ferraiolo, R. Kuhn, The NISI model for role-based access control: Towards a unified standard, in: ACM RBAC 2000, 2000, pp. 47-64.
  • 58
    • 0030086382 scopus 로고    scopus 로고
    • Access control: Principles and practices
    • Sandhu R., and Samarati P. Access control: Principles and practices. IEEE Commun. 29 2 (1996) 38-47
    • (1996) IEEE Commun. , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Samarati, P.2
  • 60
    • 0025152631 scopus 로고    scopus 로고
    • G.W. Smith, Modeling security-relevant data semantics, in: Proceedings of IEEE Symposium on Research in Security and Privacy, 1990, pp. 384-391.
  • 61
    • 0025447566 scopus 로고
    • Design of LDV: A multilevel secure relational database management system
    • Stachour P.D., and Thuraisingham B. Design of LDV: A multilevel secure relational database management system. IEEE Trans. Knowledge Data Eng. 2 2 (1990) 190-209
    • (1990) IEEE Trans. Knowledge Data Eng. , vol.2 , Issue.2 , pp. 190-209
    • Stachour, P.D.1    Thuraisingham, B.2
  • 64
    • 33747782263 scopus 로고    scopus 로고
    • H. Subramaniam, Z. Yang, Report on DIMACS working group on privacy/confidentiality of health data, Technical Report, DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ, 2003.
  • 65
    • 33747750350 scopus 로고    scopus 로고
    • D. Suciu, Semistructured data and XML, in: Handbook of Massive Data Sets, 2002, pp. 743-788.
  • 66
    • 84974776829 scopus 로고
    • A fast algorithm for detecting second paths in database inference analysis
    • Hinke T.H., Delugach H.S., and Chandrasekhar A. A fast algorithm for detecting second paths in database inference analysis. J. Comput. Security 3 2-3 (1995) 147-168
    • (1995) J. Comput. Security , vol.3 , Issue.2-3 , pp. 147-168
    • Hinke, T.H.1    Delugach, H.S.2    Chandrasekhar, A.3
  • 67
    • 0038896772 scopus 로고
    • Security checking in relational database management systems augmented with inference engines
    • Thuraisingham B.M. Security checking in relational database management systems augmented with inference engines. Comput. Security 6 (1987) 479-492
    • (1987) Comput. Security , vol.6 , pp. 479-492
    • Thuraisingham, B.M.1
  • 69
    • 2342616187 scopus 로고    scopus 로고
    • Mining diagnostic rules from clinical databases using rough sets and medical diagnostic model
    • Tsumoto S. Mining diagnostic rules from clinical databases using rough sets and medical diagnostic model. Informat. Sci. 162 (2004) 65-80
    • (2004) Informat. Sci. , vol.162 , pp. 65-80
    • Tsumoto, S.1
  • 74
    • 0002851150 scopus 로고    scopus 로고
    • Web implementation of a security mediator for medical databases
    • Lin T.Y., and Qian S. (Eds), Chapman and Hall
    • Wiederhold G., Bilello M., and Donahue C. Web implementation of a security mediator for medical databases. In: Lin T.Y., and Qian S. (Eds). Database Security XI Status and Prospent (1998), Chapman and Hall 60-67
    • (1998) Database Security XI Status and Prospent , pp. 60-67
    • Wiederhold, G.1    Bilello, M.2    Donahue, C.3
  • 75
    • 33747781909 scopus 로고    scopus 로고
    • G. Wiederhold, M. Bilello, V. Sarathy, X.L. Qian, Protecting collaboration, in: Proceedings of the NISSC 1996 National Information Systems Security Conference, 1996, pp. 561-569.
  • 76
    • 0030347009 scopus 로고    scopus 로고
    • G. Wiederhold, M. Bilello, V. Sarathy, X.L. Qian, A security mediator for health care information, in: Proceedings of the 1996 AMIA Conference, 1996, pp. 120-124.
  • 77
    • 10844289527 scopus 로고    scopus 로고
    • Xml application schema matching using similarity measure and relaxation labeling
    • Yi S., Huang B., and Chan W.T. Xml application schema matching using similarity measure and relaxation labeling. Informat. Sci. 169 (2005) 27-46
    • (2005) Informat. Sci. , vol.169 , pp. 27-46
    • Yi, S.1    Huang, B.2    Chan, W.T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.