-
1
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Biskup, J., Bonatti, P.: Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security 3, 14-27 (2004)
-
(2004)
International Journal of Information Security
, vol.3
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.2
-
2
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
Biskup, J., Bonatti, P.: Lying versus refusal for known potential secrets. Data & Knowledge Engineering 38, 199-222 (2001)
-
(2001)
Data & Knowledge Engineering
, vol.38
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.2
-
3
-
-
0347756656
-
Controlled query evaluation for known policies by combining lying and refusal
-
Biskup, J., Bonatti, P.: Controlled query evaluation for known policies by combining lying and refusal. Annals of Mathematics and Artificial Intelligence 40, 37-62 (2004)
-
(2004)
Annals of Mathematics and Artificial Intelligence
, vol.40
, pp. 37-62
-
-
Biskup, J.1
Bonatti, P.2
-
4
-
-
34547684253
-
Controlled query evaluation with open queries for a decidable relational submodel
-
Biskup, J., Bonatti, P.: Controlled query evaluation with open queries for a decidable relational submodel. Annals of Mathematics and Artificial Intelligence 50, 39-77 (2007)
-
(2007)
Annals of Mathematics and Artificial Intelligence
, vol.50
, pp. 39-77
-
-
Biskup, J.1
Bonatti, P.2
-
5
-
-
48249156214
-
Preprocessing for controlled query evaluation with availability policy
-
Biskup, J., Wiese, L.: Preprocessing for controlled query evaluation with availability policy. Journal of Computer Security 16(4), 477-494 (2008)
-
(2008)
Journal of Computer Security
, vol.16
, Issue.4
, pp. 477-494
-
-
Biskup, J.1
Wiese, L.2
-
6
-
-
38149019240
-
Enforcing confidentiality in relational databases by reducing inference control to access control
-
Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007., Springer, Heidelberg
-
Biskup, J., Lochner, J.H.: Enforcing confidentiality in relational databases by reducing inference control to access control. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.4779, pp. 407-422. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4779
, pp. 407-422
-
-
Biskup, J.1
Lochner, J.H.2
-
7
-
-
70350400871
-
Requirements and protocols for inference-proof interactions in information systems
-
Backes, M., Ning, P. (eds.) Computer Security - ESORICS 2009., Springer, Heidelberg
-
Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Requirements and protocols for inference-proof interactions in information systems. In: Backes, M., Ning, P. (eds.) Computer Security - ESORICS 2009. LNCS, vol.5789, pp. 285-302. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 285-302
-
-
Biskup, J.1
Gogolin, C.2
Seiler, J.3
Weibert, T.4
-
8
-
-
70350389154
-
Controlled query evaluation and inference-free view updates
-
Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII., Springer, Heidelberg
-
Biskup, J., Seiler, J., Weibert, T.: Controlled query evaluation and inference-free view updates. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. LNCS, vol.5645, pp. 1-16. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5645
, pp. 1-16
-
-
Biskup, J.1
Seiler, J.2
Weibert, T.3
-
9
-
-
37849036071
-
Confidentiality policies for controlled query evaluation
-
Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007., Springer, Heidelberg
-
Biskup, J., Weibert, T.: Confidentiality policies for controlled query evaluation. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.4602, pp. 1-13. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4602
, pp. 1-13
-
-
Biskup, J.1
Weibert, T.2
-
11
-
-
77951141655
-
A Framework for Inference Control in Incomplete Logic Databases
-
Weibert, T.: A Framework for Inference Control in Incomplete Logic Databases. PhD thesis, Technische Universität Dortmund (2008), http://hdl.handle.net/2003/25116
-
(2008)
PhD Thesis, Technische Universität Dortmund
-
-
Weibert, T.1
-
12
-
-
0035629553
-
Decidable fragments of first-order modal logics
-
Wolter, F., Zakharyaschev, M.: Decidable fragments of first-order modal logics. The Journal of Symbolic Logic 66(3), 1415-1438 (2001)
-
(2001)
The Journal of Symbolic Logic
, vol.66
, Issue.3
, pp. 1415-1438
-
-
Wolter, F.1
Zakharyaschev, M.2
-
13
-
-
44049112934
-
What should a database know?
-
Reiter, R.: What should a database know? Logic Programming 14, 127-153 (1992)
-
(1992)
Logic Programming
, vol.14
, pp. 127-153
-
-
Reiter, R.1
-
14
-
-
0021466634
-
Foundations of a functional approach to knowledge representation
-
Levesque, H.L.: Foundations of a functional approach to knowledge representation. Artificial Intelligence 23, 155-212 (1984)
-
(1984)
Artificial Intelligence
, vol.23
, pp. 155-212
-
-
Levesque, H.L.1
-
16
-
-
0003631440
-
-
Synthese Library, Kluwer Academic Publishers, Dordrecht
-
Fitting, M., Mendelsohn, R.L.: First-Order Modal Logic. Synthese Library, vol.277. Kluwer Academic Publishers, Dordrecht (1998)
-
(1998)
First-Order Modal Logic
, vol.277
-
-
Fitting, M.1
Mendelsohn, R.L.2
-
17
-
-
77951130634
-
Kontrollierte Anfrageauswertung in unvollständigen pr̈adikatenlogischen Datenbanken (in German)
-
Technische Universität Dortmund
-
Tadros, C.: Kontrollierte Anfrageauswertung in unvollständigen pr̈adikatenlogischen Datenbanken (in German). Diplomarbeit, Technische Universität Dortmund (2008), http://ls6-www.cs.uni-dortmund.de/uploads/tx- ls6ext/ Tadros2008Kontrollierte.pdf
-
(2008)
Diplomarbeit
-
-
Tadros, C.1
-
19
-
-
0029324246
-
Foundations of secure deductive databases
-
Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of secure deductive databases. IEEE Transactions on Knowledge and Data Engineering 7, 406-422 (1995)
-
(1995)
IEEE Transactions on Knowledge and Data Engineering
, vol.7
, pp. 406-422
-
-
Bonatti, P.A.1
Kraus, S.2
Subrahmanian, V.S.3
-
21
-
-
0034314077
-
Secure databases: Constraints, inference channels and monitoring disclosures
-
Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels and monitoring disclosures. IEEE Transactions on Knowledge and Data Engineering 12(6), 900-919 (2000)
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
22
-
-
34548075610
-
Solving satisfiability in ground logic with equality by efficient conversion to propositional logic
-
Miguel, I., Ruml,W. (eds.) SARA 2007., Springer, Heidelberg
-
Gammer, I., Amir, E.: Solving satisfiability in ground logic with equality by efficient conversion to propositional logic. In: Miguel, I., Ruml,W. (eds.) SARA 2007. LNCS (LNAI), vol.4612, pp. 169-183. Springer, Heidelberg (2007)
-
(2007)
LNCS (LNAI)
, vol.4612
, pp. 169-183
-
-
Gammer, I.1
Amir, E.2
|