메뉴 건너뛰기




Volumn 4779 LNCS, Issue , 2007, Pages 407-422

Enforcing confidentiality in relational databases by reducing inference control to access control

Author keywords

Access control; Confidentiality; Database security; Inference control; Information flow; Policy; Potential secrets; Relational databases

Indexed keywords

DATA TRANSFER; PROBLEM SOLVING; QUERY PROCESSING; RELATIONAL DATABASE SYSTEMS;

EID: 38149019240     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75496-1_27     Document Type: Conference Paper
Times cited : (16)

References (32)
  • 2
    • 0015489880 scopus 로고
    • Organization and maintenance of large ordered indices
    • Bayer, R., McCreight, E.M.: Organization and maintenance of large ordered indices. Acta Informatica 1(3), 173-189 (1972)
    • (1972) Acta Informatica , vol.1 , Issue.3 , pp. 173-189
    • Bayer, R.1    McCreight, E.M.2
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and MULTICS interpretation
    • Technical Report ESD-TR-75-306, The MITRE Corporation
    • Bell, D.E., LaPadula, L.J.: Secure computer systems: Unified exposition and MULTICS interpretation. Technical Report ESD-TR-75-306, The MITRE Corporation (1975)
    • (1975)
    • Bell, D.E.1    LaPadula, L.J.2
  • 4
    • 19944380112 scopus 로고    scopus 로고
    • Database security-concepts, approaches, and challenges
    • Bertino, E., Sandhu, R.S.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Sec. Comput. 2(1), 2-18 (2005)
    • (2005) IEEE Trans. Dependable Sec. Comput , vol.2 , Issue.1 , pp. 2-18
    • Bertino, E.1    Sandhu, R.S.2
  • 5
    • 0346236349 scopus 로고    scopus 로고
    • Art and Science. Addison-Wesley, London
    • Bishop, M.: Computer Security: Art and Science. Addison-Wesley, London (2003)
    • (2003) Computer Security
    • Bishop, M.1
  • 6
    • 0034174093 scopus 로고    scopus 로고
    • For unknown secrecies refusal is better than lying
    • Biskup, J.: For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33(1), 1-23 (2000)
    • (2000) Data Knowl. Eng , vol.33 , Issue.1 , pp. 1-23
    • Biskup, J.1
  • 7
    • 0035425994 scopus 로고    scopus 로고
    • Lying versus refusal for known potential secrets
    • Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2), 199-222 (2001)
    • (2001) Data Knowl. Eng , vol.38 , Issue.2 , pp. 199-222
    • Biskup, J.1    Bonatti, P.A.2
  • 8
    • 84956985669 scopus 로고    scopus 로고
    • Confidentiality policies and their enforcement for controlled query evaluation
    • Gollmann, D, Karjoth, G, Waidner, M, eds, ES-ORICS 2002, Springer, Heidelberg
    • Biskup, J., Bonatti, P.A.: Confidentiality policies and their enforcement for controlled query evaluation. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ES-ORICS 2002. LNCS, vol. 2502, pp. 39-54. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2502 , pp. 39-54
    • Biskup, J.1    Bonatti, P.A.2
  • 9
    • 0347756656 scopus 로고    scopus 로고
    • Controlled query evaluation for known policies by combining lying and refusal
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40(1-2), 37-62 (2004)
    • (2004) Ann. Math. Artif. Intell , vol.40 , Issue.1-2 , pp. 37-62
    • Biskup, J.1    Bonatti, P.A.2
  • 10
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14-27 (2004)
    • (2004) Int. J. Inf. Sec , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 11
    • 33745644253 scopus 로고    scopus 로고
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FolKS 2006. LNCS, 3861, pp. 43-62. Springer, Heidelberg (2006)
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FolKS 2006. LNCS, vol. 3861, pp. 43-62. Springer, Heidelberg (2006)
  • 13
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosures
    • Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng. 12(6), 900-919 (2000)
    • (2000) IEEE Trans. Knowl. Data Eng , vol.12 , Issue.6 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 14
    • 0033100756 scopus 로고    scopus 로고
    • Logical foundations of multilevel databases
    • Cuppens, F., Gabillon, A.: Logical foundations of multilevel databases. Data Knowl. Eng. 29(3), 259-291 (1999)
    • (1999) Data Knowl. Eng , vol.29 , Issue.3 , pp. 259-291
    • Cuppens, F.1    Gabillon, A.2
  • 15
    • 0035342199 scopus 로고    scopus 로고
    • Cover story management
    • Cuppens, F., Gabillon, A.: Cover story management. Data Knowl. Eng. 37(2), 177-201 (2001)
    • (2001) Data Knowl. Eng , vol.37 , Issue.2 , pp. 177-201
    • Cuppens, F.1    Gabillon, A.2
  • 16
    • 0032657567 scopus 로고    scopus 로고
    • Specification and enforcement of classification and inference constraints
    • IEEE Computer Society Press, Los Alamitos
    • Dawson, S., di Vimercati, S.D.C., Samarati, P.: Specification and enforcement of classification and inference constraints. In: IEEE Symposium on Security and Privacy, pp. 181-195. IEEE Computer Society Press, Los Alamitos (1999)
    • (1999) IEEE Symposium on Security and Privacy , pp. 181-195
    • Dawson, S.1    di Vimercati, S.D.C.2    Samarati, P.3
  • 19
    • 12244265258 scopus 로고    scopus 로고
    • The inference problem: A survey
    • Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explorations 4(2), 6-11 (2002)
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 21
    • 0004256091 scopus 로고    scopus 로고
    • 2nd edn. John Wiley & Sons, Chichester
    • Gollmann, D.: Computer Security, 2nd edn. John Wiley & Sons, Chichester (2006)
    • (2006) Computer Security
    • Gollmann, D.1
  • 23
    • 0022012611 scopus 로고
    • A comment on the 'Basic Security Theorem' of Bell and LaPadula
    • McLean, J.: A comment on the 'Basic Security Theorem' of Bell and LaPadula. Inf. Process. Lett. 20(2), 67-70 (1985)
    • (1985) Inf. Process. Lett , vol.20 , Issue.2 , pp. 67-70
    • McLean, J.1
  • 24
    • 0023218630 scopus 로고
    • Reasoning about security models
    • IEEE Computer Society Press, Los Alamitos
    • McLean, J.: Reasoning about security models. In: IEEE Symposium on Security and Privacy, pp. 123-131. IEEE Computer Society Press, Los Alamitos (1987)
    • (1987) IEEE Symposium on Security and Privacy , pp. 123-131
    • McLean, J.1
  • 25
    • 0025211594 scopus 로고
    • The specification and modeling of computer security
    • McLean, J.: The specification and modeling of computer security. IEEE Computer 23(1), 9-16 (1990)
    • (1990) IEEE Computer , vol.23 , Issue.1 , pp. 9-16
    • McLean, J.1
  • 26
    • 38149001585 scopus 로고    scopus 로고
    • A multilevel security model for distributed object systems
    • Martella, G, Kurth, H, Montolivo, E, Bertino, E, eds, ESORICS 1996, Springer, Heidelberg
    • Nicomette, V., Deswarte, Y.: A multilevel security model for distributed object systems. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 80-98. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1146 , pp. 80-98
    • Nicomette, V.1    Deswarte, Y.2
  • 27
    • 0028398878 scopus 로고
    • A taxonomy for secure object-oriented databases
    • Olivier, M.S., von Solms, S.H.: A taxonomy for secure object-oriented databases. ACM Trans. Database Syst. 19(1), 3-46 (1994)
    • (1994) ACM Trans. Database Syst , vol.19 , Issue.1 , pp. 3-46
    • Olivier, M.S.1    von Solms, S.H.2
  • 28
    • 3142702944 scopus 로고    scopus 로고
    • Extending query rewriting techniques for fine-grained access control
    • ACM Press, New York
    • Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proc. ACM SIGMOD 2004, pp. 551-562. ACM Press, New York (2004)
    • (2004) Proc. ACM SIGMOD , pp. 551-562
    • Rizvi, S.1    Mendelzon, A.2    Sudarshan, S.3    Roy, P.4
  • 30
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu, R.: Lattice-based access control models. IEEE Computer 26(11), 9-19 (1993)
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.1
  • 32
    • 84914732721 scopus 로고
    • Access control in a relational data base management system by query modification
    • Stonebraker, M., Wong, E.: Access control in a relational data base management system by query modification. In: Proc. ACM/CSC-ER Annual Conference, pp. 180-186 (1974)
    • (1974) Proc. ACM/CSC-ER Annual Conference , pp. 180-186
    • Stonebraker, M.1    Wong, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.