메뉴 건너뛰기




Volumn 7, Issue 3, 2008, Pages 199-217

Keeping secrets in incomplete databases

Author keywords

Controlled query evaluation; Incomplete databases; Inference control; Information systems

Indexed keywords

DATABASE SYSTEMS; INFERENCE ENGINES; LOGIC DESIGN; QUERY PROCESSING;

EID: 44249126774     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-007-0037-7     Document Type: Article
Times cited : (58)

References (21)
  • 1
    • 0034174093 scopus 로고    scopus 로고
    • For unknown secrecies refusal is better than lying
    • Biskup J. (2000). For unknown secrecies refusal is better than lying. Data and Know. Eng. 33: 1-23
    • (2000) Data and Know. Eng. , vol.33 , pp. 1-23
    • Biskup, J.1
  • 2
    • 0035425994 scopus 로고    scopus 로고
    • Lying versus refusal for known potential secrets
    • Biskup J. and Bonatti P.A. (2001). Lying versus refusal for known potential secrets. Data Knowl. Eng. 38: 199-222
    • (2001) Data Knowl. Eng. , vol.38 , pp. 199-222
    • Biskup, J.1    Bonatti, P.A.2
  • 3
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • Biskup J. and Bonatti P.A. (2004). Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Security 3: 14-27
    • (2004) Int. J. Inf. Security , vol.3 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 4
    • 0347756656 scopus 로고    scopus 로고
    • Controlled query evaluation for known policies by combining lying and refusal
    • Biskup J. and Bonatti P.A. (2004). Controlled query evaluation for known policies by combining lying and refusal. Ann. Mathe. Artifi. Intell. 40: 37-62
    • (2004) Ann. Mathe. Artifi. Intell. , vol.40 , pp. 37-62
    • Biskup, J.1    Bonatti, P.A.2
  • 5
    • 33745644253 scopus 로고    scopus 로고
    • Controlled query evaluation with open queries for a decidable relational submodel
    • In: Dix, J., Hegner, S.J. (eds.) Springer
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FoIKS, Lecture Notes in Computer Science, vol. 3861, pp. 43-62. Springer (2006)
    • (2006) FoIKS, Lecture Notes in Computer Science , vol.3861 , pp. 43-62
    • Biskup, J.1    Bonatti, P.A.2
  • 6
    • 84902456527 scopus 로고    scopus 로고
    • Refusal in incomplete databases
    • In: Farkas, C., Samarati, P. (eds.) Kluwer/Springer
    • Biskup, J., Weibert, T.: Refusal in incomplete databases. In: Farkas, C., Samarati, P. (eds.) Research Directions in Data and Applications Security XVIII, vol. 144, pp. 143-157. Kluwer/Springer (2004)
    • (2004) Research Directions in Data and Applications Security XVIII , vol.144 , pp. 143-157
    • Biskup, J.1    Weibert, T.2
  • 9
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosures
    • Brodsky A., Farkas C. and Jajodia S. (2000). Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl.Data Eng. 12(6): 900-919
    • (2000) IEEE Trans. Knowl.Data Eng. , vol.12 , Issue.6 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 13
    • 12244265258 scopus 로고    scopus 로고
    • The inference problem: A survey
    • Farkas C. and Jajodia S. (2002). The inference problem: A survey. SIGKDD Explorations 4(2): 6-11
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 16
    • 0031097770 scopus 로고    scopus 로고
    • A semantic framework of the multilevel secure relational model
    • Qian X. and Lunt T.F. (1997). A semantic framework of the multilevel secure relational model. IEEE Trans. Knowl. Data Eng. 9(2): 292-301
    • (1997) IEEE Trans. Knowl. Data Eng. , vol.9 , Issue.2 , pp. 292-301
    • Qian, X.1    Lunt, T.F.2
  • 19
  • 20
    • 0142219258 scopus 로고    scopus 로고
    • Precisely answering multi-dimensional range queries without privacy breaches
    • In: Snekkenes, E., Gollmann, D.(eds.) Springer
    • Wang, L., Li, Y., Wijesekera, D., Jajodia, S.: Precisely answering multi-dimensional range queries without privacy breaches. In: Snekkenes, E., Gollmann, D.(eds.) ESORICS, Lecture Notes in Computer Science, vol. 2808, pp. 100-115. Springer (2003)
    • (2003) ESORICS, Lecture Notes in Computer Science , vol.2808 , pp. 100-115
    • Wang, L.1    Li, Y.2    Wijesekera, D.3    Jajodia, S.4
  • 21
    • 0028720693 scopus 로고
    • Formal query languages for secure relational databases
    • Winslett M., Smith K. and Qian X. (1994). Formal query languages for secure relational databases. ACM Trans. Database Syst. 19(4): 626-662
    • (1994) ACM Trans. Database Syst. , vol.19 , Issue.4 , pp. 626-662
    • Winslett, M.1    Smith, K.2    Qian, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.