메뉴 건너뛰기




Volumn 5789 LNCS, Issue , 2009, Pages 285-302

Requirements and protocols for inference-proof interactions in information systems

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT INTERACTION; INFERENCE CONTROL;

EID: 70350400871     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04444-1_18     Document Type: Conference Paper
Times cited : (6)

References (42)
  • 2
    • 0019666494 scopus 로고
    • Update semantics of relational views
    • Bancilhon, F., Spyratos, N.: Update semantics of relational views. ACM Trans. Database Syst. 6(4), 557-575 (1981)
    • (1981) ACM Trans. Database Syst , vol.6 , Issue.4 , pp. 557-575
    • Bancilhon, F.1    Spyratos, N.2
  • 3
    • 0035425994 scopus 로고    scopus 로고
    • Lying versus refusal for known potential secrets
    • Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2), 199-222 (2001)
    • (2001) Data Knowl. Eng , vol.38 , Issue.2 , pp. 199-222
    • Biskup, J.1    Bonatti, P.A.2
  • 4
    • 70350393799 scopus 로고    scopus 로고
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3, 14-27 (2004)
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3, 14-27 (2004)
  • 5
    • 0347756656 scopus 로고    scopus 로고
    • Controlled query evaluation for known policies by combining lying and refusal
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Art. Intell. 40, 37-62 (2004)
    • (2004) Ann. Math. Art. Intell , vol.40 , pp. 37-62
    • Biskup, J.1    Bonatti, P.A.2
  • 6
    • 34547684253 scopus 로고    scopus 로고
    • Controlled query evaluation with open queries for a decidable relational submodel
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Art. Intell. 50, 39-77 (2007)
    • (2007) Ann. Math. Art. Intell , vol.50 , pp. 39-77
    • Biskup, J.1    Bonatti, P.A.2
  • 7
    • 37849036071 scopus 로고    scopus 로고
    • Confidentiality policies for controlled query evaluation
    • Barker, S, Ahn, G.-J, eds, Data and Applications Security 2007, Springer, Heidelberg
    • Biskup, J.,Weibert, T.: Confidentiality policies for controlled query evaluation. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 1-13. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4602 , pp. 1-13
    • Biskup, J.1    Weibert, T.2
  • 8
    • 44249126774 scopus 로고    scopus 로고
    • Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7, 199-217 (2008)
    • Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7, 199-217 (2008)
  • 9
    • 38849139678 scopus 로고    scopus 로고
    • Reducing inference control to access control for normalized database schemas
    • Biskup, J., Embley, D., Lochner, J.-H.: Reducing inference control to access control for normalized database schemas. Information Processing Letters 106, 8-12 (2008)
    • (2008) Information Processing Letters , vol.106 , pp. 8-12
    • Biskup, J.1    Embley, D.2    Lochner, J.-H.3
  • 11
    • 79959257426 scopus 로고    scopus 로고
    • Optimization of the controlled evaluation of closed relational queries
    • Proc. IFIP/SEC, Springer, Heidelberg
    • Biskup, J., Lochner, J.-H., Sonntag, S.: Optimization of the controlled evaluation of closed relational queries. In: Proc. IFIP/SEC 2009, IFIP Series 297, pp. 214-225. Springer, Heidelberg (2009)
    • (2009) IFIP Series , vol.297 , pp. 214-225
    • Biskup, J.1    Lochner, J.-H.2    Sonntag, S.3
  • 12
    • 70350389154 scopus 로고    scopus 로고
    • Biskup, J., Seiler, J., Weibert, T.: Controlled query evaluation and inference-free view updates. In: DBSec 2009. LNCS, 5645, pp. 1-16. Springer, Heidelberg (2009)
    • Biskup, J., Seiler, J., Weibert, T.: Controlled query evaluation and inference-free view updates. In: DBSec 2009. LNCS, vol. 5645, pp. 1-16. Springer, Heidelberg (2009)
  • 13
    • 34250624952 scopus 로고    scopus 로고
    • Bohannon, A., Pierce, B.C., Vaughan, J.A.: Relational lenses: a language for updatable views. In: PODS 2006, pp. 338-347. ACM, New York (2006)
    • Bohannon, A., Pierce, B.C., Vaughan, J.A.: Relational lenses: a language for updatable views. In: PODS 2006, pp. 338-347. ACM, New York (2006)
  • 15
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels and monitoring disclosure
    • Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: constraints, inference channels and monitoring disclosure. IEEE Trans. Knowledge and Data Eng. 12(6), 900-919 (2000)
    • (2000) IEEE Trans. Knowledge and Data Eng , vol.12 , Issue.6 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 16
    • 0033100756 scopus 로고    scopus 로고
    • Logical foundation of multilevel databases
    • Cuppens, F., Gabillon, A.: Logical foundation of multilevel databases. Data Knowl. Eng. 29, 259-291 (1999)
    • (1999) Data Knowl. Eng , vol.29 , pp. 259-291
    • Cuppens, F.1    Gabillon, A.2
  • 18
    • 0020183057 scopus 로고
    • On correct translation of update operations on relational views
    • Dayal, U., Bernstein, P.A.: On correct translation of update operations on relational views. ACM Trans. Database Systems 8, 381-416 (1982)
    • (1982) ACM Trans. Database Systems , vol.8 , pp. 381-416
    • Dayal, U.1    Bernstein, P.A.2
  • 21
    • 57349187196 scopus 로고    scopus 로고
    • Evfimieski, A., Fagin, R., Woodruff, D.: Epistemic privacy. In: PODS 2008, pp. 171-180. ACM, New York (2008)
    • Evfimieski, A., Fagin, R., Woodruff, D.: Epistemic privacy. In: PODS 2008, pp. 171-180. ACM, New York (2008)
  • 22
    • 45949091693 scopus 로고    scopus 로고
    • The inference problem and updates in relational databases
    • Kluwer, Dordrecht
    • Farkas, C., Toland, T.S., Eastman, C.M.: The inference problem and updates in relational databases. In: Proc. DBSec 2001, IFIP Conf. Proc., vol. 215, pp. 181-194. Kluwer, Dordrecht (2001)
    • (2001) Proc. DBSec 2001, IFIP Conf. Proc , vol.215 , pp. 181-194
    • Farkas, C.1    Toland, T.S.2    Eastman, C.M.3
  • 23
    • 70350407467 scopus 로고    scopus 로고
    • Farkas, C., Jajodia, S.: The inference problem: a survey. SIGKDD Explor. Newsl. 4(2), 6-11 (2002)
    • Farkas, C., Jajodia, S.: The inference problem: a survey. SIGKDD Explor. Newsl. 4(2), 6-11 (2002)
  • 25
    • 0026157130 scopus 로고
    • Toward a mathematical foundation for information flow properties
    • Oakland, pp
    • Gray III, J.W.: Toward a mathematical foundation for information flow properties. In: Proc. IEEE Symposium on Security and Privacy, Oakland, pp. 21-34 (1991)
    • (1991) Proc. IEEE Symposium on Security and Privacy , pp. 21-34
    • Gray III, J.W.1
  • 27
    • 0345863801 scopus 로고    scopus 로고
    • An order-based theory of updates for relational views
    • Hegner, S.J.: An order-based theory of updates for relational views. Ann. Math. Art. Intell. 40, 63-125 (2004)
    • (2004) Ann. Math. Art. Intell , vol.40 , pp. 63-125
    • Hegner, S.J.1
  • 29
    • 33244455692 scopus 로고    scopus 로고
    • Kenthapadi, K., Mishra, N., Nissim, K.: Simulatable auditing. In: PODS 2005, pp. 118-127. ACM, New York (2005)
    • Kenthapadi, K., Mishra, N., Nissim, K.: Simulatable auditing. In: PODS 2005, pp. 118-127. ACM, New York (2005)
  • 30
    • 0025401306 scopus 로고
    • View updates in relational databases with an independent scheme
    • Langerak, R.: View updates in relational databases with an independent scheme. ACM Trans. Database Systems 15, 40-66 (1990)
    • (1990) ACM Trans. Database Systems , vol.15 , pp. 40-66
    • Langerak, R.1
  • 33
    • 33845891886 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. J. Computer and System Sciences 73, 507-534 (2007)
    • (2007) J. Computer and System Sciences , vol.73 , pp. 507-534
    • Miklau, G.1    Suciu, D.2
  • 35
    • 84862604885 scopus 로고    scopus 로고
    • Towardsa robustness in query auditing
    • VLDB Endowment, pp
    • Nabar, S.U., Narthi, B., Kenthapadi, K., Mishra, N., Motwani, R.: Towardsa robustness in query auditing. In: VLDB 2006, VLDB Endowment, pp. 151-162 (2006)
    • (2006) VLDB , pp. 151-162
    • Nabar, S.U.1    Narthi, B.2    Kenthapadi, K.3    Mishra, N.4    Motwani, R.5
  • 36
    • 84949243805 scopus 로고    scopus 로고
    • Mathematical models of computer security
    • Focardi, R, Gorrieri, R, eds, FOSAD 2000, Springer, Heidelberg
    • Ryan, P.: Mathematical models of computer security. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 1-62. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2171 , pp. 1-62
    • Ryan, P.1
  • 37
    • 85029488605 scopus 로고
    • Polyinstantiation for cover stories
    • Deswarte, Y, Quisquater, J.-J, Eizenberg, G, eds, ESORICS 1992, Springer, Heidelberg
    • Sandhu, R.S., Jajodia, S.: Polyinstantiation for cover stories. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol. 648, pp. 307-328. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.648 , pp. 307-328
    • Sandhu, R.S.1    Jajodia, S.2
  • 38
    • 33750235645 scopus 로고    scopus 로고
    • A formal framework for confidentiality-preserving refinement
    • Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
    • Santen, T.: A formal framework for confidentiality-preserving refinement. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 225-242. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189 , pp. 225-242
    • Santen, T.1
  • 40
    • 70350405579 scopus 로고    scopus 로고
    • Stouppa, P., Studer, T.: Data privacy for ALC knowledge bases. In: Artemov, S., Nerode, A. (eds.) LFCS 2009. LNCS, 5407, pp. 309-421. Springer, Heidelberg (2008)
    • Stouppa, P., Studer, T.: Data privacy for ALC knowledge bases. In: Artemov, S., Nerode, A. (eds.) LFCS 2009. LNCS, vol. 5407, pp. 309-421. Springer, Heidelberg (2008)
  • 41
    • 0028720693 scopus 로고
    • Formal query languages for secure relational databases
    • Winslett, M., Smith, K., Qian, X.: Formal query languages for secure relational databases. ACM Trans. Database Systems 19(4), 626-662 (1994)
    • (1994) ACM Trans. Database Systems , vol.19 , Issue.4 , pp. 626-662
    • Winslett, M.1    Smith, K.2    Qian, X.3
  • 42
    • 77049113795 scopus 로고    scopus 로고
    • Zhang, Z., Mendelzon, A.O.: Authorization views and conditional query containment. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, 3363, pp. 259-273. Springer, Heidelberg (2004)
    • Zhang, Z., Mendelzon, A.O.: Authorization views and conditional query containment. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 259-273. Springer, Heidelberg (2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.