-
1
-
-
0034174093
-
For unknown secrecies refusal is better than lying
-
Biskup J. (2000). For unknown secrecies refusal is better than lying. Data and Know. Eng. 33: 1-23
-
(2000)
Data and Know. Eng.
, vol.33
, pp. 1-23
-
-
Biskup, J.1
-
2
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
Biskup J. and Bonatti P.A. (2001). Lying versus refusal for known potential secrets. Data Knowl. Eng. 38: 199-222
-
(2001)
Data Knowl. Eng.
, vol.38
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.A.2
-
3
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Biskup J. and Bonatti P.A. (2004). Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Security 3: 14-27
-
(2004)
Int. J. Inf. Security
, vol.3
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
4
-
-
0347756656
-
Controlled query evaluation for known policies by combining lying and refusal
-
Biskup J. and Bonatti P.A. (2004). Controlled query evaluation for known policies by combining lying and refusal. Ann. Mathe. Artifi. Intell. 40: 37-62
-
(2004)
Ann. Mathe. Artifi. Intell.
, vol.40
, pp. 37-62
-
-
Biskup, J.1
Bonatti, P.A.2
-
5
-
-
33745644253
-
Controlled query evaluation with open queries for a decidable relational submodel
-
In: Dix, J., Hegner, S.J. (eds.) Springer
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FoIKS, Lecture Notes in Computer Science, vol. 3861, pp. 43-62. Springer (2006)
-
(2006)
FoIKS, Lecture Notes in Computer Science
, vol.3861
, pp. 43-62
-
-
Biskup, J.1
Bonatti, P.A.2
-
6
-
-
84902456527
-
Refusal in incomplete databases
-
In: Farkas, C., Samarati, P. (eds.) Kluwer/Springer
-
Biskup, J., Weibert, T.: Refusal in incomplete databases. In: Farkas, C., Samarati, P. (eds.) Research Directions in Data and Applications Security XVIII, vol. 144, pp. 143-157. Kluwer/Springer (2004)
-
(2004)
Research Directions in Data and Applications Security XVIII
, vol.144
, pp. 143-157
-
-
Biskup, J.1
Weibert, T.2
-
7
-
-
37849036071
-
Confidentiality policies for controlled query evaluation
-
In: Barker, S., Ahn, G.-J. (eds) Springer
-
Biskup, J., Weibert, T.: Confidentiality policies for controlled query evaluation. In: Barker, S., Ahn, G.-J. (eds) 21st Annual IFIP WG 11.3 Working Conference on Applications and Data Security, Lecture Notes in Computer Science, vol. 4602, pp. 1-13, Springer (2007)
-
(2007)
21st Annual IFIP WG 11.3 Working Conference on Applications and Data Security, Lecture Notes in Computer Science
, vol.4602
, pp. 1-13
-
-
Biskup, J.1
Weibert, T.2
-
9
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
Brodsky A., Farkas C. and Jajodia S. (2000). Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl.Data Eng. 12(6): 900-919
-
(2000)
IEEE Trans. Knowl.Data Eng.
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
10
-
-
0004190705
-
-
ACM Press
-
Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. ACM Press (1995)
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
12
-
-
0003730235
-
-
MIT Press
-
Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning About Knowledge. MIT Press (1995)
-
(1995)
Reasoning About Knowledge
-
-
Fagin, R.1
Halpern, J.Y.2
Moses, Y.3
Vardi, M.Y.4
-
13
-
-
12244265258
-
The inference problem: A survey
-
Farkas C. and Jajodia S. (2002). The inference problem: A survey. SIGKDD Explorations 4(2): 6-11
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
15
-
-
0025442003
-
The seaview security model
-
Lunt T.F., Denning D.E., Schell R.R., Heckman M. and Shockley W.R. (1990). The seaview security model. IEEE Trans. Softw. Eng. 16(6): 593-607
-
(1990)
IEEE Trans. Softw. Eng.
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
16
-
-
0031097770
-
A semantic framework of the multilevel secure relational model
-
Qian X. and Lunt T.F. (1997). A semantic framework of the multilevel secure relational model. IEEE Trans. Knowl. Data Eng. 9(2): 292-301
-
(1997)
IEEE Trans. Knowl. Data Eng.
, vol.9
, Issue.2
, pp. 292-301
-
-
Qian, X.1
Lunt, T.F.2
-
17
-
-
0020718929
-
Answering queries without revealing secrets
-
Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1):41-59 http://doi.acm.org/10.1145/319830.319833 (1983)
-
(1983)
ACM Trans. Database Syst.
, vol.8
, Issue.1
, pp. 41-59
-
-
Sicherman, G.L.1
de Jonge, W.2
van de Riet, R.P.3
-
19
-
-
3543091604
-
Securing OLAP data cubes against privacy breaches
-
In: IEEE Computer Society
-
Wang, L., Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: IEEE Symposium on Security and Privacy, pp. 161-178. IEEE Computer Society (2004)
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 161-178
-
-
Wang, L.1
Jajodia, S.2
Wijesekera, D.3
-
20
-
-
0142219258
-
Precisely answering multi-dimensional range queries without privacy breaches
-
In: Snekkenes, E., Gollmann, D.(eds.) Springer
-
Wang, L., Li, Y., Wijesekera, D., Jajodia, S.: Precisely answering multi-dimensional range queries without privacy breaches. In: Snekkenes, E., Gollmann, D.(eds.) ESORICS, Lecture Notes in Computer Science, vol. 2808, pp. 100-115. Springer (2003)
-
(2003)
ESORICS, Lecture Notes in Computer Science
, vol.2808
, pp. 100-115
-
-
Wang, L.1
Li, Y.2
Wijesekera, D.3
Jajodia, S.4
-
21
-
-
0028720693
-
Formal query languages for secure relational databases
-
Winslett M., Smith K. and Qian X. (1994). Formal query languages for secure relational databases. ACM Trans. Database Syst. 19(4): 626-662
-
(1994)
ACM Trans. Database Syst.
, vol.19
, Issue.4
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
|