메뉴 건너뛰기




Volumn 20, Issue 8, 2008, Pages 1013-1027

Protection of database security via collaborative inference detection

Author keywords

Artificial intelligence; Computation methodologies; Deduction and theorem proving and knowledge processing; Inference engines; Operating systems; Security and privacy protection; Software software engineering

Indexed keywords

COLLABORATIVE USERS; DATA ACCESSING; DATA DEPENDENCIES; DATABASE SCHEMA; DATABASE SECURITY; DETECTION SYSTEMS; EXPERIMENTAL STUDIES; KEY FACTORS; MALICIOUS USERS; MULTI USERS; QUERY SEQUENCES; SEMANTIC INFERENCE; SEMANTIC KNOWLEDGE; SENSITIVE DATA; SENSITIVE INFORMATIONS; SINGLE-USER (SU);

EID: 46649105922     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2007.190642     Document Type: Conference Paper
Times cited : (20)

References (45)
  • 6
    • 0035250750 scopus 로고    scopus 로고
    • Recursive Conditioning
    • A. Darwiche, "Recursive Conditioning," Artificial Intelligence, vol. 126, nos. 1-2, pp. 5-41, 2001.
    • (2001) Artificial Intelligence , vol.126 , Issue.1-2 , pp. 5-41
    • Darwiche, A.1
  • 11
    • 0033188982 scopus 로고    scopus 로고
    • Bucket Elimination: A Unifying Framework for Reasoning
    • R. Dechter, "Bucket Elimination: A Unifying Framework for Reasoning," Artificial Intelligence, vol. 113, pp. 41-85, 1999.
    • (1999) Artificial Intelligence , vol.113 , pp. 41-85
    • Dechter, R.1
  • 12
    • 0030085404 scopus 로고    scopus 로고
    • Wizard: A Database Inference Analysis and Detection System
    • Feb
    • H.S. Delugach and T.H. Hinke, "Wizard: A Database Inference Analysis and Detection System," IEEE Trans. Knowledge and Data Eng., vol. 8, no. 1, pp. 56-66, Feb. 1996.
    • (1996) IEEE Trans. Knowledge and Data Eng , vol.8 , Issue.1 , pp. 56-66
    • Delugach, H.S.1    Hinke, T.H.2
  • 14
    • 12244265258 scopus 로고    scopus 로고
    • The Inference Problem: A Survey
    • C. Farkas and S. Jajodia, "The Inference Problem: A Survey," SIGKDD Explorations, vol. 4, no. 2, pp. 6-11, 2002.
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 19
    • 0003846041 scopus 로고    scopus 로고
    • A Tutorial on Learning with Bayesian Networks,
    • Microsoft Research
    • D. Heckerman, "A Tutorial on Learning with Bayesian Networks," technical report, Microsoft Research, 1996.
    • (1996) technical report
    • Heckerman, D.1
  • 22
    • 46649098944 scopus 로고    scopus 로고
    • Real-World Applications of Bayesian Networks Comm. ACM, D. Heckerman, A. Mamdani, and M.P. Wellman, guest eds., 38, no. 3, pp. 24-68, Mar. 1995.
    • "Real-World Applications of Bayesian Networks" Comm. ACM, D. Heckerman, A. Mamdani, and M.P. Wellman, guest eds., vol. 38, no. 3, pp. 24-68, Mar. 1995.
  • 26
    • 0029322870 scopus 로고
    • Sensitivity Analysis for Probability Assessments in Bayesian Networks
    • K.B. Laskey, "Sensitivity Analysis for Probability Assessments in Bayesian Networks," IEEE Trans. Systems, Man, and Cybernetics, vol. 25, p. 909, 1995.
    • (1995) IEEE Trans. Systems, Man, and Cybernetics , vol.25 , pp. 909
    • Laskey, K.B.1
  • 27
    • 0001006209 scopus 로고
    • Local Computations with Probabilities on Graphical Structures and Their Application to Expert Systems (with Discussion)
    • S.L. Lauritzen and D.J. Spiegelhalter, "Local Computations with Probabilities on Graphical Structures and Their Application to Expert Systems (with Discussion)," J. Royal Statistical Soc. B, vol. 50, no. 2, pp. 157-224, 1988.
    • (1988) J. Royal Statistical Soc. B , vol.50 , Issue.2 , pp. 157-224
    • Lauritzen, S.L.1    Spiegelhalter, D.J.2
  • 28
    • 33947387917 scopus 로고    scopus 로고
    • Trust Management in Distributed Systems
    • Feb
    • H. Li and M. Singhal, "Trust Management in Distributed Systems," Computer, vol. 40, no. 2, pp. 45-53, Feb. 2007.
    • (2007) Computer , vol.40 , Issue.2 , pp. 45-53
    • Li, H.1    Singhal, M.2
  • 29
    • 29244436370 scopus 로고    scopus 로고
    • Taxonomy of Trust: Categorizing P2P Reputation Systems
    • S. Marti and H. Garcia-Molina, "Taxonomy of Trust: Categorizing P2P Reputation Systems," Computer Networks, vol. 50, no. 4, pp. 472-484, 2006.
    • (2006) Computer Networks , vol.50 , Issue.4 , pp. 472-484
    • Marti, S.1    Garcia-Molina, H.2
  • 32
    • 33947575029 scopus 로고    scopus 로고
    • Samlam by Automated Reasoning Group, Los Angeles
    • Samlam by Automated Reasoning Group, Univ. of California, Los Angeles, http://reasoning.cs.ucla.edu/samiam/, 2006.
    • (2006) Univ. of California
  • 37
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
    • L. Xiong and L. Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities," IEEE Trans. Knowledge and Data Eng., vol. 16, 2004.
    • (2004) IEEE Trans. Knowledge and Data Eng , vol.16
    • Xiong, L.1    Liu, L.2
  • 41
    • 0038148412 scopus 로고    scopus 로고
    • A Unified Scheme for Resource Protection in Automated Trust Negotiation
    • May
    • T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy (SP '03), p. 110, May 2003.
    • (2003) Proc. IEEE Symp. Security and Privacy (SP '03) , pp. 110
    • Yu, T.1    Winslett, M.2
  • 45
    • 0000049635 scopus 로고    scopus 로고
    • Exploiting Causal Independence in Bayesian Network Inference
    • N. Zhang and D. Poole, "Exploiting Causal Independence in Bayesian Network Inference," J. Artificial Intelligence Research, vol. 5, pp. 301-328, 1996.
    • (1996) J. Artificial Intelligence Research , vol.5 , pp. 301-328
    • Zhang, N.1    Poole, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.