-
1
-
-
0003928313
-
-
Addison-Wesley, Reading
-
Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
3
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2), 199-222 (2001)
-
(2001)
Data Knowl. Eng
, vol.38
, Issue.2
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.A.2
-
4
-
-
70350393799
-
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3, 14-27 (2004)
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3, 14-27 (2004)
-
-
-
-
5
-
-
0347756656
-
Controlled query evaluation for known policies by combining lying and refusal
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Art. Intell. 40, 37-62 (2004)
-
(2004)
Ann. Math. Art. Intell
, vol.40
, pp. 37-62
-
-
Biskup, J.1
Bonatti, P.A.2
-
6
-
-
34547684253
-
Controlled query evaluation with open queries for a decidable relational submodel
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Art. Intell. 50, 39-77 (2007)
-
(2007)
Ann. Math. Art. Intell
, vol.50
, pp. 39-77
-
-
Biskup, J.1
Bonatti, P.A.2
-
7
-
-
37849036071
-
Confidentiality policies for controlled query evaluation
-
Barker, S, Ahn, G.-J, eds, Data and Applications Security 2007, Springer, Heidelberg
-
Biskup, J.,Weibert, T.: Confidentiality policies for controlled query evaluation. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 1-13. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4602
, pp. 1-13
-
-
Biskup, J.1
Weibert, T.2
-
8
-
-
44249126774
-
-
Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7, 199-217 (2008)
-
Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7, 199-217 (2008)
-
-
-
-
9
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
Biskup, J., Embley, D., Lochner, J.-H.: Reducing inference control to access control for normalized database schemas. Information Processing Letters 106, 8-12 (2008)
-
(2008)
Information Processing Letters
, vol.106
, pp. 8-12
-
-
Biskup, J.1
Embley, D.2
Lochner, J.-H.3
-
11
-
-
79959257426
-
Optimization of the controlled evaluation of closed relational queries
-
Proc. IFIP/SEC, Springer, Heidelberg
-
Biskup, J., Lochner, J.-H., Sonntag, S.: Optimization of the controlled evaluation of closed relational queries. In: Proc. IFIP/SEC 2009, IFIP Series 297, pp. 214-225. Springer, Heidelberg (2009)
-
(2009)
IFIP Series
, vol.297
, pp. 214-225
-
-
Biskup, J.1
Lochner, J.-H.2
Sonntag, S.3
-
12
-
-
70350389154
-
-
Biskup, J., Seiler, J., Weibert, T.: Controlled query evaluation and inference-free view updates. In: DBSec 2009. LNCS, 5645, pp. 1-16. Springer, Heidelberg (2009)
-
Biskup, J., Seiler, J., Weibert, T.: Controlled query evaluation and inference-free view updates. In: DBSec 2009. LNCS, vol. 5645, pp. 1-16. Springer, Heidelberg (2009)
-
-
-
-
13
-
-
34250624952
-
-
Bohannon, A., Pierce, B.C., Vaughan, J.A.: Relational lenses: a language for updatable views. In: PODS 2006, pp. 338-347. ACM, New York (2006)
-
Bohannon, A., Pierce, B.C., Vaughan, J.A.: Relational lenses: a language for updatable views. In: PODS 2006, pp. 338-347. ACM, New York (2006)
-
-
-
-
14
-
-
0029324246
-
Foundations of secure deductive databases
-
Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of secure deductive databases. IEEE Trans. Knowledge and Data Eng. 7(3), 406-422 (1995)
-
(1995)
IEEE Trans. Knowledge and Data Eng
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.A.1
Kraus, S.2
Subrahmanian, V.S.3
-
15
-
-
0034314077
-
Secure databases: Constraints, inference channels and monitoring disclosure
-
Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: constraints, inference channels and monitoring disclosure. IEEE Trans. Knowledge and Data Eng. 12(6), 900-919 (2000)
-
(2000)
IEEE Trans. Knowledge and Data Eng
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
16
-
-
0033100756
-
Logical foundation of multilevel databases
-
Cuppens, F., Gabillon, A.: Logical foundation of multilevel databases. Data Knowl. Eng. 29, 259-291 (1999)
-
(1999)
Data Knowl. Eng
, vol.29
, pp. 259-291
-
-
Cuppens, F.1
Gabillon, A.2
-
18
-
-
0020183057
-
On correct translation of update operations on relational views
-
Dayal, U., Bernstein, P.A.: On correct translation of update operations on relational views. ACM Trans. Database Systems 8, 381-416 (1982)
-
(1982)
ACM Trans. Database Systems
, vol.8
, pp. 381-416
-
-
Dayal, U.1
Bernstein, P.A.2
-
20
-
-
0023292280
-
Views for multilevel database security
-
Denning, D.E., Akl, S., Heckman, M., Lunt, T., Morgenstern, M., Neumann, P., Schell, R.: Views for multilevel database security. IEEE Trans. Software Eng. 13(2), 129-140 (1987)
-
(1987)
IEEE Trans. Software Eng
, vol.13
, Issue.2
, pp. 129-140
-
-
Denning, D.E.1
Akl, S.2
Heckman, M.3
Lunt, T.4
Morgenstern, M.5
Neumann, P.6
Schell, R.7
-
21
-
-
57349187196
-
-
Evfimieski, A., Fagin, R., Woodruff, D.: Epistemic privacy. In: PODS 2008, pp. 171-180. ACM, New York (2008)
-
Evfimieski, A., Fagin, R., Woodruff, D.: Epistemic privacy. In: PODS 2008, pp. 171-180. ACM, New York (2008)
-
-
-
-
22
-
-
45949091693
-
The inference problem and updates in relational databases
-
Kluwer, Dordrecht
-
Farkas, C., Toland, T.S., Eastman, C.M.: The inference problem and updates in relational databases. In: Proc. DBSec 2001, IFIP Conf. Proc., vol. 215, pp. 181-194. Kluwer, Dordrecht (2001)
-
(2001)
Proc. DBSec 2001, IFIP Conf. Proc
, vol.215
, pp. 181-194
-
-
Farkas, C.1
Toland, T.S.2
Eastman, C.M.3
-
23
-
-
70350407467
-
-
Farkas, C., Jajodia, S.: The inference problem: a survey. SIGKDD Explor. Newsl. 4(2), 6-11 (2002)
-
Farkas, C., Jajodia, S.: The inference problem: a survey. SIGKDD Explor. Newsl. 4(2), 6-11 (2002)
-
-
-
-
25
-
-
0026157130
-
Toward a mathematical foundation for information flow properties
-
Oakland, pp
-
Gray III, J.W.: Toward a mathematical foundation for information flow properties. In: Proc. IEEE Symposium on Security and Privacy, Oakland, pp. 21-34 (1991)
-
(1991)
Proc. IEEE Symposium on Security and Privacy
, pp. 21-34
-
-
Gray III, J.W.1
-
27
-
-
0345863801
-
An order-based theory of updates for relational views
-
Hegner, S.J.: An order-based theory of updates for relational views. Ann. Math. Art. Intell. 40, 63-125 (2004)
-
(2004)
Ann. Math. Art. Intell
, vol.40
, pp. 63-125
-
-
Hegner, S.J.1
-
29
-
-
33244455692
-
-
Kenthapadi, K., Mishra, N., Nissim, K.: Simulatable auditing. In: PODS 2005, pp. 118-127. ACM, New York (2005)
-
Kenthapadi, K., Mishra, N., Nissim, K.: Simulatable auditing. In: PODS 2005, pp. 118-127. ACM, New York (2005)
-
-
-
-
30
-
-
0025401306
-
View updates in relational databases with an independent scheme
-
Langerak, R.: View updates in relational databases with an independent scheme. ACM Trans. Database Systems 15, 40-66 (1990)
-
(1990)
ACM Trans. Database Systems
, vol.15
, pp. 40-66
-
-
Langerak, R.1
-
31
-
-
0025442003
-
The SeaView security model
-
Lunt, T.F., Denning, D.E., Schell, R.R., Heckman, M., Shockley,W.R.: The SeaView security model. IEEE Trans. Software Eng. 16(6), 593-607 (1990)
-
(1990)
IEEE Trans. Software Eng
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
33
-
-
33845891886
-
A formal analysis of information disclosure in data exchange
-
Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. J. Computer and System Sciences 73, 507-534 (2007)
-
(2007)
J. Computer and System Sciences
, vol.73
, pp. 507-534
-
-
Miklau, G.1
Suciu, D.2
-
34
-
-
52649162862
-
Auditing SQL queries
-
IEEE, Los Alamitos
-
Motwani, R., Nabar, S.U., Thomas, D.: Auditing SQL queries. In: Proc. Int. Conf. on Data Eng., ICDE 2008, pp. 287-296. IEEE, Los Alamitos (2008)
-
(2008)
Proc. Int. Conf. on Data Eng
, vol.ICDE 2008
, pp. 287-296
-
-
Motwani, R.1
Nabar, S.U.2
Thomas, D.3
-
35
-
-
84862604885
-
Towardsa robustness in query auditing
-
VLDB Endowment, pp
-
Nabar, S.U., Narthi, B., Kenthapadi, K., Mishra, N., Motwani, R.: Towardsa robustness in query auditing. In: VLDB 2006, VLDB Endowment, pp. 151-162 (2006)
-
(2006)
VLDB
, pp. 151-162
-
-
Nabar, S.U.1
Narthi, B.2
Kenthapadi, K.3
Mishra, N.4
Motwani, R.5
-
36
-
-
84949243805
-
Mathematical models of computer security
-
Focardi, R, Gorrieri, R, eds, FOSAD 2000, Springer, Heidelberg
-
Ryan, P.: Mathematical models of computer security. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 1-62. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2171
, pp. 1-62
-
-
Ryan, P.1
-
37
-
-
85029488605
-
Polyinstantiation for cover stories
-
Deswarte, Y, Quisquater, J.-J, Eizenberg, G, eds, ESORICS 1992, Springer, Heidelberg
-
Sandhu, R.S., Jajodia, S.: Polyinstantiation for cover stories. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol. 648, pp. 307-328. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.648
, pp. 307-328
-
-
Sandhu, R.S.1
Jajodia, S.2
-
38
-
-
33750235645
-
A formal framework for confidentiality-preserving refinement
-
Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
-
Santen, T.: A formal framework for confidentiality-preserving refinement. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 225-242. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 225-242
-
-
Santen, T.1
-
39
-
-
0020718929
-
Answering queries without revealing secrets
-
Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Systems 8(1), 41-59 (1983)
-
(1983)
ACM Trans. Database Systems
, vol.8
, Issue.1
, pp. 41-59
-
-
Sicherman, G.L.1
de Jonge, W.2
van de Riet, R.P.3
-
40
-
-
70350405579
-
-
Stouppa, P., Studer, T.: Data privacy for ALC knowledge bases. In: Artemov, S., Nerode, A. (eds.) LFCS 2009. LNCS, 5407, pp. 309-421. Springer, Heidelberg (2008)
-
Stouppa, P., Studer, T.: Data privacy for ALC knowledge bases. In: Artemov, S., Nerode, A. (eds.) LFCS 2009. LNCS, vol. 5407, pp. 309-421. Springer, Heidelberg (2008)
-
-
-
-
41
-
-
0028720693
-
Formal query languages for secure relational databases
-
Winslett, M., Smith, K., Qian, X.: Formal query languages for secure relational databases. ACM Trans. Database Systems 19(4), 626-662 (1994)
-
(1994)
ACM Trans. Database Systems
, vol.19
, Issue.4
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
-
42
-
-
77049113795
-
-
Zhang, Z., Mendelzon, A.O.: Authorization views and conditional query containment. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, 3363, pp. 259-273. Springer, Heidelberg (2004)
-
Zhang, Z., Mendelzon, A.O.: Authorization views and conditional query containment. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 259-273. Springer, Heidelberg (2004)
-
-
-
|