메뉴 건너뛰기




Volumn 4602 LNCS, Issue , 2007, Pages 1-13

Confidentiality policies for controlled query evaluation

Author keywords

Confidentiality policies; Inference control; Logic databases

Indexed keywords

DATABASE SYSTEMS; INFORMATION SYSTEMS; USER INTERFACES; QUERY PROCESSING; SEMANTICS;

EID: 37849036071     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73538-0_1     Document Type: Conference Paper
Times cited : (8)

References (24)
  • 4
    • 37849044228 scopus 로고    scopus 로고
    • Domingo-Ferrer, J. (ed.): Inference Control in Statistical Databases. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, 2316, Springer, Heidelberg (2002)
    • Domingo-Ferrer, J. (ed.): Inference Control in Statistical Databases. In: Domingo-Ferrer, J. (ed.) Inference Control in Statistical Databases. LNCS, vol. 2316, Springer, Heidelberg (2002)
  • 5
    • 3543091604 scopus 로고    scopus 로고
    • Securing OLAP data cubes against privacy breaches
    • IEEE Computer Society, Los Alamitos
    • Wang, L., Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: IEEE Symposium on Security and Privacy, pp. 161-178. IEEE Computer Society, Los Alamitos (2004)
    • (2004) IEEE Symposium on Security and Privacy , pp. 161-178
    • Wang, L.1    Jajodia, S.2    Wijesekera, D.3
  • 6
    • 0142219258 scopus 로고    scopus 로고
    • Precisely answering multi-dimensional range queries without privacy breaches
    • Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
    • Wang, L., Li, Y., Wijesekera, D., Jajodia, S.: Precisely answering multi-dimensional range queries without privacy breaches. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2808
    • Wang, L.1    Li, Y.2    Wijesekera, D.3    Jajodia, S.4
  • 12
    • 12244265258 scopus 로고    scopus 로고
    • The inference problem: A survey
    • Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explorations 4(2), 6-11 (2002)
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 15
    • 0034174093 scopus 로고    scopus 로고
    • For unknown secrecies refusal is better than lying
    • Biskup, J.: For unknown secrecies refusal is better than lying. Data & Knowledge Engineering 33, 1-23 (2000)
    • (2000) Data & Knowledge Engineering , vol.33 , pp. 1-23
    • Biskup, J.1
  • 16
    • 33745644253 scopus 로고    scopus 로고
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FoIKS 2006. LNCS, 3861, pp. 43-62. Springer, Heidelberg (2006)
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FoIKS 2006. LNCS, vol. 3861, pp. 43-62. Springer, Heidelberg (2006)
  • 17
    • 0035425994 scopus 로고    scopus 로고
    • Lying versus refusal for known potential secrets
    • Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data & Knowledge Engineering 38, 199-222 (2001)
    • (2001) Data & Knowledge Engineering , vol.38 , pp. 199-222
    • Biskup, J.1    Bonatti, P.A.2
  • 18
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security 3, 14-27 (2004)
    • (2004) International Journal of Information Security , vol.3 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 19
  • 20
    • 84902456527 scopus 로고    scopus 로고
    • Biskup, J., Weibert, T.: Refusal in incomplete databases. In: Research Directions in Data and Applications Security XVIII, pp. 143-157 Kluwer/Springer (2004)
    • Biskup, J., Weibert, T.: Refusal in incomplete databases. In: Research Directions in Data and Applications Security XVIII, pp. 143-157 Kluwer/Springer (2004)
  • 21
    • 37849026140 scopus 로고    scopus 로고
    • Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Submitted, 2007. Extended abstract presented at the LICS'05 Affiliated Workshop on Foundations of Computer Security (FCS'05), available from http://www.es.Chalmers.se/andrei/FCS05/fcs05.pdf (2005)
    • Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Submitted, 2007. Extended abstract presented at the LICS'05 Affiliated Workshop on Foundations of Computer Security (FCS'05), available from http://www.es.Chalmers.se/andrei/FCS05/fcs05.pdf (2005)
  • 24
    • 33845239096 scopus 로고    scopus 로고
    • Winslett, M.: An introduction to trust negotiation. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, 2692, pp. 275-283. Springer, Heidelberg (2003)
    • Winslett, M.: An introduction to trust negotiation. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 275-283. Springer, Heidelberg (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.