메뉴 건너뛰기




Volumn 29, Issue 1, 2010, Pages 88-103

The inference problem: Maintaining maximal availability in the presence of database updates

Author keywords

Access control; Availability; Collaboration; Collusion; Confidentiality; Database; Disclosure inference; Updates

Indexed keywords

DATA AVAILABILITY; DATABASE CONSTRAINTS; EMPIRICAL RESULTS; INFERENCE ALGORITHM; INFERENCE PROBLEM; SOUNDNESS AND COMPLETENESS;

EID: 71649113077     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.07.004     Document Type: Article
Times cited : (16)

References (39)
  • 1
    • 0035425994 scopus 로고    scopus 로고
    • Lying versus refusal for known potential secrets
    • Biskup J., and Bonatti P. Lying versus refusal for known potential secrets. Data Engineering 38 2 (2001) 199-222
    • (2001) Data Engineering , vol.38 , Issue.2 , pp. 199-222
    • Biskup, J.1    Bonatti, P.2
  • 3
    • 0007938807 scopus 로고
    • Database inference controller
    • Spooner D., and Landwehr C. (Eds), North-Holland, Amsterdam
    • Buczkowski L.J. Database inference controller. In: Spooner D., and Landwehr C. (Eds). Database security III: status and prospects (1990), North-Holland, Amsterdam 311-322
    • (1990) Database security III: status and prospects , pp. 311-322
    • Buczkowski, L.J.1
  • 4
    • 33745882349 scopus 로고    scopus 로고
    • Database security protection via inference detection
    • Intelligence and security informatics. Mehrotra S., Zeng D., Chen H., Thuraisingham B., and Wang F. (Eds), Springer Berlin, Heidelberg
    • Chen Y., and Chu W. Database security protection via inference detection. In: Mehrotra S., Zeng D., Chen H., Thuraisingham B., and Wang F. (Eds). Intelligence and security informatics. Lecture Notes in Computer Science (LNCS) vol. 3975 (2006), Springer Berlin, Heidelberg 452-458
    • (2006) Lecture Notes in Computer Science (LNCS) , vol.3975 , pp. 452-458
    • Chen, Y.1    Chu, W.2
  • 5
    • 45949088836 scopus 로고    scopus 로고
    • Protection of database security via collaborative inference detection
    • Intelligence and security informatics. Chen H., and Yang C. (Eds), Springer Berlin, Heidelberg
    • Chen Y., and Chu W. Protection of database security via collaborative inference detection. In: Chen H., and Yang C. (Eds). Intelligence and security informatics. Lecture Notes in Computer Science (LNCS) vol. 135 (2008), Springer Berlin, Heidelberg 275-303
    • (2008) Lecture Notes in Computer Science (LNCS) , vol.135 , pp. 275-303
    • Chen, Y.1    Chu, W.2
  • 10
    • 84937407052 scopus 로고
    • Commutative filters for reducing inference threats in multilevel database systems
    • Denning DE. Commutative filters for reducing inference threats in multilevel database systems. In: Proceedings of the IEEE symposium on security and privacy; 1985. p. 134-46.
    • (1985) Proceedings of the IEEE symposium on security and privacy , pp. 134-146
    • Denning, D.E.1
  • 11
    • 71649084902 scopus 로고    scopus 로고
    • Inference control in statistical databases: from theory to practice
    • Springer-Verlag, Berlin, Heidelberg
    • Domingo-Ferrer J. Inference control in statistical databases: from theory to practice. Lecture Notes in Computer Science vol. 2316 (2002), Springer-Verlag, Berlin, Heidelberg
    • (2002) Lecture Notes in Computer Science , vol.2316
    • Domingo-Ferrer, J.1
  • 12
    • 70349274133 scopus 로고    scopus 로고
    • Privacy in statistical databases: casc project international workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings series
    • Privacy in statistical databases. Domingo-Ferrer J., and Torra V. (Eds), Springer
    • Privacy in statistical databases: casc project international workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings series. In: Domingo-Ferrer J., and Torra V. (Eds). Privacy in statistical databases. Lecture Notes in Computer Science vol. 3050 (2004), Springer
    • (2004) Lecture Notes in Computer Science , vol.3050
  • 13
    • 26944448516 scopus 로고    scopus 로고
    • Ordinal, continuous and heterogeneous k-anonymity through microaggregation
    • Domingo-Ferrer J., and Torra V. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining and Knowledge Discovery 11 2 (2005) 117-212
    • (2005) Data Mining and Knowledge Discovery , vol.11 , Issue.2 , pp. 117-212
    • Domingo-Ferrer, J.1    Torra, V.2
  • 18
    • 84974776829 scopus 로고
    • A fast algorithm for detecting second paths in database inference analysis
    • Hinke T.H., Delugach H.S., and Chandrasekhar A. A fast algorithm for detecting second paths in database inference analysis. Journal of Computer Security 3 2, 3 (1995) 147-168
    • (1995) Journal of Computer Security , vol.3 , Issue.2-3 , pp. 147-168
    • Hinke, T.H.1    Delugach, H.S.2    Chandrasekhar, A.3
  • 21
    • 71649093494 scopus 로고    scopus 로고
    • Security against inference attacks on negative information in object-oriented databases
    • Springer-Verlag, London, UK
    • Ishihara Y., Ako S., and Fujiwara T. Security against inference attacks on negative information in object-oriented databases. ICICS 2002, Lecture Notes in Computer Science vol. 2513 (2002), Springer-Verlag, London, UK 49-60
    • (2002) ICICS 2002, Lecture Notes in Computer Science , vol.2513 , pp. 49-60
    • Ishihara, Y.1    Ako, S.2    Fujiwara, T.3
  • 22
    • 0007664281 scopus 로고
    • Inference problems in multilevel secure database management systems
    • Abrams M., Jajodia S., and Podell H. (Eds), IEEE Computer Society Press, Los Alamitos, Calif.
    • Jajodia S., and Meadows C. Inference problems in multilevel secure database management systems. In: Abrams M., Jajodia S., and Podell H. (Eds). Information security: an integrated collection of essays (1995), IEEE Computer Society Press, Los Alamitos, Calif. 570-584
    • (1995) Information security: an integrated collection of essays , pp. 570-584
    • Jajodia, S.1    Meadows, C.2
  • 25
    • 84949777168 scopus 로고    scopus 로고
    • Enhancing the controlled disclosure of sensitive information
    • Proceedings of the European symposium on research in computer security, Springer-Verlag
    • Marks D.G., Motro A., and Jajodia S. Enhancing the controlled disclosure of sensitive information. Proceedings of the European symposium on research in computer security. Lecture Notes in Computer Science vol. 1146 (1996), Springer-Verlag 290-303
    • (1996) Lecture Notes in Computer Science , vol.1146 , pp. 290-303
    • Marks, D.G.1    Motro, A.2    Jajodia, S.3
  • 33
    • 0038896772 scopus 로고
    • Security checking in relational database management systems augmented with inference engines
    • Thuraisingham B.M. Security checking in relational database management systems augmented with inference engines. Computers & Security 6 (1987) 479-492
    • (1987) Computers & Security , vol.6 , pp. 479-492
    • Thuraisingham, B.M.1
  • 37
    • 0003257371 scopus 로고    scopus 로고
    • Elements of statistical disclosure control
    • Springer-Verlag, New York, NY
    • Willenborg L., and de Waal T. Elements of statistical disclosure control. Lecture notes in statistics vol. 155 (2001), Springer-Verlag, New York, NY
    • (2001) Lecture notes in statistics , vol.155
    • Willenborg, L.1    de Waal, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.