메뉴 건너뛰기




Volumn 5999 LNCS, Issue , 2010, Pages 80-106

Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction execution

Author keywords

[No Author keywords available]

Indexed keywords

APRIORI; CLIENT INTERACTION; CONTROL MECHANISM; FORMAL VERIFICATIONS; INFERENCE CONTROL; INFORMATION CONTENTS; POLICY DRIVEN; PROTECTION REQUIREMENTS; REASONING CAPABILITIES;

EID: 77951549976     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-12038-1_7     Document Type: Conference Paper
Times cited : (14)

References (45)
  • 1
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1), 65-104 (1999)
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 2
    • 1142309815 scopus 로고    scopus 로고
    • Provisions and obligations in policy management and security applications
    • Morgan Kaufmann, San Francisco
    • Bettini, C., Jajodia, S., Wang, X.S., Wijesekera, D.: Provisions and obligations in policy management and security applications. In: Very Large Data Bases, VLDB 2002, pp. 502-513. Morgan Kaufmann, San Francisco (2002)
    • (2002) Very Large Data Bases, VLDB 2002 , pp. 502-513
    • Bettini, C.1    Jajodia, S.2    Wang, X.S.3    Wijesekera, D.4
  • 3
    • 0034174093 scopus 로고    scopus 로고
    • For unknown secrecies refusal is better than lying
    • Biskup, J.: For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33(1), 1-23 (2000)
    • (2000) Data Knowl. Eng. , vol.33 , Issue.1 , pp. 1-23
    • Biskup, J.1
  • 5
    • 0035425994 scopus 로고    scopus 로고
    • Lying versus refusal for known potential secrets
    • Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2), 199-222 (2001)
    • (2001) Data Knowl. Eng. , vol.38 , Issue.2 , pp. 199-222
    • Biskup, J.1    Bonatti, P.A.2
  • 6
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14-27 (2004)
    • (2004) Int. J. Inf. Sec. , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 7
    • 0347756656 scopus 로고    scopus 로고
    • Controlled query evaluation for known policies by combining lying and refusal
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40(1-2), 37-62 (2004)
    • (2004) Ann. Math. Artif. Intell. , vol.40 , Issue.1-2 , pp. 37-62
    • Biskup, J.1    Bonatti, P.A.2
  • 8
    • 34547684253 scopus 로고    scopus 로고
    • Controlled query evaluation with open queries for a decidable relational submodel
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50(1-2), 39-77 (2007)
    • (2007) Ann. Math. Artif. Intell. , vol.50 , Issue.1-2 , pp. 39-77
    • Biskup, J.1    Bonatti, P.A.2
  • 9
    • 38149011376 scopus 로고    scopus 로고
    • Inference control in logic databases as a constraint satisfaction problem
    • McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. Springer, Heidelberg
    • Biskup, J., Burgard, D.M., Weibert, T., Wiese, L.: Inference control in logic databases as a constraint satisfaction problem. In: McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. LNCS, vol.4812, pp. 128-142. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4812 , pp. 128-142
    • Biskup, J.1    Burgard, D.M.2    Weibert, T.3    Wiese, L.4
  • 10
    • 38849139678 scopus 로고    scopus 로고
    • Reducing inference control to access control for normalized database schemas
    • Biskup, J., Embley, D.W., Lochner, J.-H.: Reducing inference control to access control for normalized database schemas. Inf. Process. Lett. 106(1), 8-12 (2008)
    • (2008) Inf. Process. Lett. , vol.106 , Issue.1 , pp. 8-12
    • Biskup, J.1    Embley, D.W.2    Lochner, J.-H.3
  • 11
    • 70350400871 scopus 로고    scopus 로고
    • Requirements and protocols for inference-proof interactions in information systems
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Requirements and protocols for inference-proof interactions in information systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.5789, pp. 285-302. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 285-302
    • Biskup, J.1    Gogolin, C.2    Seiler, J.3    Weibert, T.4
  • 12
    • 38149019240 scopus 로고    scopus 로고
    • Enforcing confidentiality in relational databases by reducing inference control to access control
    • Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
    • Biskup, J., Lochner, J.-H.: Enforcing confidentiality in relational databases by reducing inference control to access control. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.4779, pp. 407-422. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4779 , pp. 407-422
    • Biskup, J.1    Lochner, J.-H.2
  • 13
    • 79959257426 scopus 로고    scopus 로고
    • Optimization of the controlled evaluation of closed relational queries
    • Gritzalis, D., Lopez, J. (eds.) IFIP AICT, Springer, Heidelberg
    • Biskup, J., Lochner, J.-H., Sonntag, S.: Optimization of the controlled evaluation of closed relational queries. In: Gritzalis, D., Lopez, J. (eds.) Emerging Challenges for Security, Privacy and Trust. IFIP AICT, vol.297, pp. 214-225. Springer, Heidelberg (2009)
    • (2009) Emerging Challenges for Security, Privacy and Trust. , vol.297 , pp. 214-225
    • Biskup, J.1    Lochner, J.-H.2    Sonntag, S.3
  • 14
    • 70350389154 scopus 로고    scopus 로고
    • Controlled query evaluation and inference-free view updates
    • Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. Springer, Heidelberg
    • Biskup, J., Seiler, J., Weibert, T.: Controlled query evaluation and inference-free view updates. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. LNCS, vol.5645, pp. 1-16. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5645 , pp. 1-16
    • Biskup, J.1    Seiler, J.2    Weibert, T.3
  • 15
    • 77951113434 scopus 로고    scopus 로고
    • Towards controlled query evaluation for incomplete first-order databases
    • Link, S., Prade, H. (eds.) FOIKS 2010. Springer, Heidelberg
    • Biskup, J., Tadros, C., Wiese, L.: Towards controlled query evaluation for incomplete first-order databases. In: Link, S., Prade, H. (eds.) FOIKS 2010. LNCS, vol.5956, pp. 230-247. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5956 , pp. 230-247
    • Biskup, J.1    Tadros, C.2    Wiese, L.3
  • 16
    • 37849036071 scopus 로고    scopus 로고
    • Confidentiality policies for controlled query evaluation
    • Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. Springer, Heidelberg
    • Biskup, J., Weibert, T.: Confidentiality policies for controlled query evaluation. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.4602, pp. 1-13. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4602 , pp. 1-13
    • Biskup, J.1    Weibert, T.2
  • 17
    • 44249126774 scopus 로고    scopus 로고
    • Keeping secrets in incomplete databases
    • Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7(3), 199-217 (2008)
    • (2008) Int. J. Inf. Sec. , vol.7 , Issue.3 , pp. 199-217
    • Biskup, J.1    Weibert, T.2
  • 18
    • 48249156214 scopus 로고    scopus 로고
    • Preprocessing for controlled query evaluation with availability policy
    • Biskup, J., Wiese, L.: Preprocessing for controlled query evaluation with availability policy. Journal of Computer Security 16(4), 477-494 (2008)
    • (2008) Journal of Computer Security , vol.16 , Issue.4 , pp. 477-494
    • Biskup, J.1    Wiese, L.2
  • 19
    • 70350414506 scopus 로고    scopus 로고
    • Combining consistency and confidentiality requirements in first-order databases
    • Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
    • Biskup, J., Wiese, L.: Combining consistency and confidentiality requirements in first-order databases. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.5735, pp. 121-134. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5735 , pp. 121-134
    • Biskup, J.1    Wiese, L.2
  • 21
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosures
    • Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng. 12(6), 900-919 (2000)
    • (2000) IEEE Trans. Knowl. Data Eng. , vol.12 , Issue.6 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 22
    • 0035342199 scopus 로고    scopus 로고
    • Cover story management
    • Cuppens, F., Gabillon, A.: Cover story management. Data Knowl. Eng. 37(2), 177-201 (2001)
    • (2001) Data Knowl. Eng. , vol.37 , Issue.2 , pp. 177-201
    • Cuppens, F.1    Gabillon, A.2
  • 24
    • 24644431553 scopus 로고    scopus 로고
    • Policies, models, and languages for access control
    • Bhalla, S. (ed.) DNIS 2005. Springer, Heidelberg
    • De Capitani di Vimercati, S., Samarati, P., Jajodia, S.: Policies, models, and languages for access control. In: Bhalla, S. (ed.) DNIS 2005. LNCS, vol.3433, pp. 225-237. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3433 , pp. 225-237
    • De Capitani Di Vimercati, S.1    Samarati, P.2    Jajodia, S.3
  • 25
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • ACM, New York
    • Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: a review and open problems. In: New Security Paradigms Workshop, NSPW 2001, pp. 13-22. ACM, New York (2001)
    • New Security Paradigms Workshop, NSPW 2001 , vol.2001 , pp. 13-22
    • Du, W.1    Atallah, M.J.2
  • 27
    • 12244265258 scopus 로고    scopus 로고
    • The inference problem: A survey
    • Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explorations 4(2), 6-11 (2002)
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 29
    • 0004256091 scopus 로고    scopus 로고
    • 2nd edn. John Wiley and Sons, Chichester
    • Gollmann, D.: Computer Security, 2nd edn. John Wiley and Sons, Chichester (2006)
    • (2006) Computer Security
    • Gollmann, D.1
  • 31
    • 34247199424 scopus 로고    scopus 로고
    • An equational logic based approach to the security problem against inference attacks on object-oriented databases
    • Ishihara, Y., Morita, T., Seki, H., Ito, M.: An equational logic based approach to the security problem against inference attacks on object-oriented databases. J. Comput. Syst. Sci. 73(5), 788-817 (2007)
    • (2007) J. Comput. Syst. Sci. , vol.73 , Issue.5 , pp. 788-817
    • Ishihara, Y.1    Morita, T.2    Seki, H.3    Ito, M.4
  • 32
    • 0028755016 scopus 로고
    • On the validity of the Bell-La Padula model
    • Lindgreen, E.R., Herschberg, I.S.: On the validity of the Bell-La Padula model. Computers & Security 13(4), 317-333 (1994)
    • (1994) Computers & Security , vol.13 , Issue.4 , pp. 317-333
    • Lindgreen, E.R.1    Herschberg, I.S.2
  • 33
    • 77951519649 scopus 로고    scopus 로고
    • 11g Release 1 (11.1). B28286-03, Oracle Corporation
    • Lorentz, D., et al.: Oracle Database SQL Language Reference, 11g Release 1 (11.1). B28286-03, Oracle Corporation (2008), http://www.oracle.com/pls/db111/ to-pdf?partno=b28286
    • (2008) Oracle Database SQL Language Reference
    • Lorentz, D.1
  • 35
    • 33845891886 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. J. Comput. Syst. Sci. 73(3), 507-534 (2007)
    • (2007) J. Comput. Syst. Sci. , vol.73 , Issue.3 , pp. 507-534
    • Miklau, G.1    Suciu, D.2
  • 39
    • 84914732721 scopus 로고
    • Access control in a relational data base management system by query modification
    • ACM, New York
    • Stonebraker, M., Wong, E.: Access control in a relational data base management system by query modification. In: ACM/CSC-ER Annual Conference, pp. 180-186. ACM, New York (1974)
    • (1974) ACM/CSC-ER Annual Conference , pp. 180-186
    • Stonebraker, M.1    Wong, E.2
  • 40
    • 67650486144 scopus 로고    scopus 로고
    • Data privacy for knowledge bases
    • Artemov, S., Nerode, A. (eds.) LFCS 2009. Springer, Heidelberg
    • Stouppa, P., Studer, T.: Data privacy for knowledge bases. In: Artemov, S., Nerode, A. (eds.) LFCS 2009. LNCS, vol.5407, pp. 409-421. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5407 , pp. 409-421
    • Stouppa, P.1    Studer, T.2
  • 44
    • 0028720693 scopus 로고
    • Formal query languages for secure relational databases
    • Winslett, M., Smith, K., Qian, X.: Formal query languages for secure relational databases. ACM Trans. Database Syst. 19(4), 626-662 (1994)
    • (1994) ACM Trans. Database Syst. , vol.19 , Issue.4 , pp. 626-662
    • Winslett, M.1    Smith, K.2    Qian, X.3
  • 45
    • 77049113795 scopus 로고    scopus 로고
    • Authorization views and conditional query containment
    • Eiter, T., Libkin, L. (eds.) ICDT 2005. Springer, Heidelberg
    • Zhang, Z., Mendelzon, A.O.: Authorization views and conditional query containment. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol.3363, pp. 259-273. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3363 , pp. 259-273
    • Zhang, Z.1    Mendelzon, A.O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.