-
1
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
Biskup J., and Bonatti P. Lying versus refusal for known potential secrets. Data Engineering 38 2 (2001) 199-222
-
(2001)
Data Engineering
, vol.38
, Issue.2
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.2
-
2
-
-
0034314077
-
Secure databases: constraints, inference channels, and monitoring disclosure
-
Brodsky A., Farkas C., and Jajodia S. Secure databases: constraints, inference channels, and monitoring disclosure. IEEE Transactions on Knowledge and Data Engineering (November, 2000)
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
3
-
-
0007938807
-
Database inference controller
-
Spooner D., and Landwehr C. (Eds), North-Holland, Amsterdam
-
Buczkowski L.J. Database inference controller. In: Spooner D., and Landwehr C. (Eds). Database security III: status and prospects (1990), North-Holland, Amsterdam 311-322
-
(1990)
Database security III: status and prospects
, pp. 311-322
-
-
Buczkowski, L.J.1
-
4
-
-
33745882349
-
Database security protection via inference detection
-
Intelligence and security informatics. Mehrotra S., Zeng D., Chen H., Thuraisingham B., and Wang F. (Eds), Springer Berlin, Heidelberg
-
Chen Y., and Chu W. Database security protection via inference detection. In: Mehrotra S., Zeng D., Chen H., Thuraisingham B., and Wang F. (Eds). Intelligence and security informatics. Lecture Notes in Computer Science (LNCS) vol. 3975 (2006), Springer Berlin, Heidelberg 452-458
-
(2006)
Lecture Notes in Computer Science (LNCS)
, vol.3975
, pp. 452-458
-
-
Chen, Y.1
Chu, W.2
-
5
-
-
45949088836
-
Protection of database security via collaborative inference detection
-
Intelligence and security informatics. Chen H., and Yang C. (Eds), Springer Berlin, Heidelberg
-
Chen Y., and Chu W. Protection of database security via collaborative inference detection. In: Chen H., and Yang C. (Eds). Intelligence and security informatics. Lecture Notes in Computer Science (LNCS) vol. 135 (2008), Springer Berlin, Heidelberg 275-303
-
(2008)
Lecture Notes in Computer Science (LNCS)
, vol.135
, pp. 275-303
-
-
Chen, Y.1
Chu, W.2
-
10
-
-
84937407052
-
Commutative filters for reducing inference threats in multilevel database systems
-
Denning DE. Commutative filters for reducing inference threats in multilevel database systems. In: Proceedings of the IEEE symposium on security and privacy; 1985. p. 134-46.
-
(1985)
Proceedings of the IEEE symposium on security and privacy
, pp. 134-146
-
-
Denning, D.E.1
-
11
-
-
71649084902
-
Inference control in statistical databases: from theory to practice
-
Springer-Verlag, Berlin, Heidelberg
-
Domingo-Ferrer J. Inference control in statistical databases: from theory to practice. Lecture Notes in Computer Science vol. 2316 (2002), Springer-Verlag, Berlin, Heidelberg
-
(2002)
Lecture Notes in Computer Science
, vol.2316
-
-
Domingo-Ferrer, J.1
-
12
-
-
70349274133
-
Privacy in statistical databases: casc project international workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings series
-
Privacy in statistical databases. Domingo-Ferrer J., and Torra V. (Eds), Springer
-
Privacy in statistical databases: casc project international workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004. Proceedings series. In: Domingo-Ferrer J., and Torra V. (Eds). Privacy in statistical databases. Lecture Notes in Computer Science vol. 3050 (2004), Springer
-
(2004)
Lecture Notes in Computer Science
, vol.3050
-
-
-
13
-
-
26944448516
-
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
-
Domingo-Ferrer J., and Torra V. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining and Knowledge Discovery 11 2 (2005) 117-212
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, Issue.2
, pp. 117-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
18
-
-
84974776829
-
A fast algorithm for detecting second paths in database inference analysis
-
Hinke T.H., Delugach H.S., and Chandrasekhar A. A fast algorithm for detecting second paths in database inference analysis. Journal of Computer Security 3 2, 3 (1995) 147-168
-
(1995)
Journal of Computer Security
, vol.3
, Issue.2-3
, pp. 147-168
-
-
Hinke, T.H.1
Delugach, H.S.2
Chandrasekhar, A.3
-
21
-
-
71649093494
-
Security against inference attacks on negative information in object-oriented databases
-
Springer-Verlag, London, UK
-
Ishihara Y., Ako S., and Fujiwara T. Security against inference attacks on negative information in object-oriented databases. ICICS 2002, Lecture Notes in Computer Science vol. 2513 (2002), Springer-Verlag, London, UK 49-60
-
(2002)
ICICS 2002, Lecture Notes in Computer Science
, vol.2513
, pp. 49-60
-
-
Ishihara, Y.1
Ako, S.2
Fujiwara, T.3
-
22
-
-
0007664281
-
Inference problems in multilevel secure database management systems
-
Abrams M., Jajodia S., and Podell H. (Eds), IEEE Computer Society Press, Los Alamitos, Calif.
-
Jajodia S., and Meadows C. Inference problems in multilevel secure database management systems. In: Abrams M., Jajodia S., and Podell H. (Eds). Information security: an integrated collection of essays (1995), IEEE Computer Society Press, Los Alamitos, Calif. 570-584
-
(1995)
Information security: an integrated collection of essays
, pp. 570-584
-
-
Jajodia, S.1
Meadows, C.2
-
25
-
-
84949777168
-
Enhancing the controlled disclosure of sensitive information
-
Proceedings of the European symposium on research in computer security, Springer-Verlag
-
Marks D.G., Motro A., and Jajodia S. Enhancing the controlled disclosure of sensitive information. Proceedings of the European symposium on research in computer security. Lecture Notes in Computer Science vol. 1146 (1996), Springer-Verlag 290-303
-
(1996)
Lecture Notes in Computer Science
, vol.1146
, pp. 290-303
-
-
Marks, D.G.1
Motro, A.2
Jajodia, S.3
-
33
-
-
0038896772
-
Security checking in relational database management systems augmented with inference engines
-
Thuraisingham B.M. Security checking in relational database management systems augmented with inference engines. Computers & Security 6 (1987) 479-492
-
(1987)
Computers & Security
, vol.6
, pp. 479-492
-
-
Thuraisingham, B.M.1
-
35
-
-
33646126939
-
2Mon): an improved query processing solution
-
Jonker W., and Petkovic M. (Eds), Springer-Verlag, Berlin Heidelberg, Trondheim, Norway
-
2Mon): an improved query processing solution. In: Jonker W., and Petkovic M. (Eds). Proceedings of secure data management: second VLDB workshop (SDM 2005) (2005), Springer-Verlag, Berlin Heidelberg, Trondheim, Norway 124-142
-
(2005)
Proceedings of secure data management: second VLDB workshop (SDM 2005)
, pp. 124-142
-
-
Toland, T.S.1
Farkas, C.2
Eastman, C.M.3
-
37
-
-
0003257371
-
Elements of statistical disclosure control
-
Springer-Verlag, New York, NY
-
Willenborg L., and de Waal T. Elements of statistical disclosure control. Lecture notes in statistics vol. 155 (2001), Springer-Verlag, New York, NY
-
(2001)
Lecture notes in statistics
, vol.155
-
-
Willenborg, L.1
de Waal, T.2
-
38
-
-
14844310246
-
Private inference control
-
ACM Press, New York, NY, USA
-
Woodruff D., and Staddon J. Private inference control. CCS '04: proceedings of the 11th ACM conference on computer and communications security (2004), ACM Press, New York, NY, USA 188-197
-
(2004)
CCS '04: proceedings of the 11th ACM conference on computer and communications security
, pp. 188-197
-
-
Woodruff, D.1
Staddon, J.2
|