-
1
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1), 65-104 (1999)
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
2
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
Morgan Kaufmann, San Francisco
-
Bettini, C., Jajodia, S., Wang, X.S., Wijesekera, D.: Provisions and obligations in policy management and security applications. In: Very Large Data Bases, VLDB 2002, pp. 502-513. Morgan Kaufmann, San Francisco (2002)
-
(2002)
Very Large Data Bases, VLDB 2002
, pp. 502-513
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
3
-
-
0034174093
-
For unknown secrecies refusal is better than lying
-
Biskup, J.: For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33(1), 1-23 (2000)
-
(2000)
Data Knowl. Eng.
, vol.33
, Issue.1
, pp. 1-23
-
-
Biskup, J.1
-
5
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2), 199-222 (2001)
-
(2001)
Data Knowl. Eng.
, vol.38
, Issue.2
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.A.2
-
6
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14-27 (2004)
-
(2004)
Int. J. Inf. Sec.
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
7
-
-
0347756656
-
Controlled query evaluation for known policies by combining lying and refusal
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40(1-2), 37-62 (2004)
-
(2004)
Ann. Math. Artif. Intell.
, vol.40
, Issue.1-2
, pp. 37-62
-
-
Biskup, J.1
Bonatti, P.A.2
-
8
-
-
34547684253
-
Controlled query evaluation with open queries for a decidable relational submodel
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50(1-2), 39-77 (2007)
-
(2007)
Ann. Math. Artif. Intell.
, vol.50
, Issue.1-2
, pp. 39-77
-
-
Biskup, J.1
Bonatti, P.A.2
-
9
-
-
38149011376
-
Inference control in logic databases as a constraint satisfaction problem
-
McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. Springer, Heidelberg
-
Biskup, J., Burgard, D.M., Weibert, T., Wiese, L.: Inference control in logic databases as a constraint satisfaction problem. In: McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. LNCS, vol.4812, pp. 128-142. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4812
, pp. 128-142
-
-
Biskup, J.1
Burgard, D.M.2
Weibert, T.3
Wiese, L.4
-
10
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
Biskup, J., Embley, D.W., Lochner, J.-H.: Reducing inference control to access control for normalized database schemas. Inf. Process. Lett. 106(1), 8-12 (2008)
-
(2008)
Inf. Process. Lett.
, vol.106
, Issue.1
, pp. 8-12
-
-
Biskup, J.1
Embley, D.W.2
Lochner, J.-H.3
-
11
-
-
70350400871
-
Requirements and protocols for inference-proof interactions in information systems
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Requirements and protocols for inference-proof interactions in information systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.5789, pp. 285-302. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 285-302
-
-
Biskup, J.1
Gogolin, C.2
Seiler, J.3
Weibert, T.4
-
12
-
-
38149019240
-
Enforcing confidentiality in relational databases by reducing inference control to access control
-
Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
-
Biskup, J., Lochner, J.-H.: Enforcing confidentiality in relational databases by reducing inference control to access control. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.4779, pp. 407-422. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4779
, pp. 407-422
-
-
Biskup, J.1
Lochner, J.-H.2
-
13
-
-
79959257426
-
Optimization of the controlled evaluation of closed relational queries
-
Gritzalis, D., Lopez, J. (eds.) IFIP AICT, Springer, Heidelberg
-
Biskup, J., Lochner, J.-H., Sonntag, S.: Optimization of the controlled evaluation of closed relational queries. In: Gritzalis, D., Lopez, J. (eds.) Emerging Challenges for Security, Privacy and Trust. IFIP AICT, vol.297, pp. 214-225. Springer, Heidelberg (2009)
-
(2009)
Emerging Challenges for Security, Privacy and Trust.
, vol.297
, pp. 214-225
-
-
Biskup, J.1
Lochner, J.-H.2
Sonntag, S.3
-
14
-
-
70350389154
-
Controlled query evaluation and inference-free view updates
-
Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. Springer, Heidelberg
-
Biskup, J., Seiler, J., Weibert, T.: Controlled query evaluation and inference-free view updates. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. LNCS, vol.5645, pp. 1-16. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5645
, pp. 1-16
-
-
Biskup, J.1
Seiler, J.2
Weibert, T.3
-
15
-
-
77951113434
-
Towards controlled query evaluation for incomplete first-order databases
-
Link, S., Prade, H. (eds.) FOIKS 2010. Springer, Heidelberg
-
Biskup, J., Tadros, C., Wiese, L.: Towards controlled query evaluation for incomplete first-order databases. In: Link, S., Prade, H. (eds.) FOIKS 2010. LNCS, vol.5956, pp. 230-247. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5956
, pp. 230-247
-
-
Biskup, J.1
Tadros, C.2
Wiese, L.3
-
16
-
-
37849036071
-
Confidentiality policies for controlled query evaluation
-
Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. Springer, Heidelberg
-
Biskup, J., Weibert, T.: Confidentiality policies for controlled query evaluation. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.4602, pp. 1-13. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4602
, pp. 1-13
-
-
Biskup, J.1
Weibert, T.2
-
17
-
-
44249126774
-
Keeping secrets in incomplete databases
-
Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7(3), 199-217 (2008)
-
(2008)
Int. J. Inf. Sec.
, vol.7
, Issue.3
, pp. 199-217
-
-
Biskup, J.1
Weibert, T.2
-
18
-
-
48249156214
-
Preprocessing for controlled query evaluation with availability policy
-
Biskup, J., Wiese, L.: Preprocessing for controlled query evaluation with availability policy. Journal of Computer Security 16(4), 477-494 (2008)
-
(2008)
Journal of Computer Security
, vol.16
, Issue.4
, pp. 477-494
-
-
Biskup, J.1
Wiese, L.2
-
19
-
-
70350414506
-
Combining consistency and confidentiality requirements in first-order databases
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
-
Biskup, J., Wiese, L.: Combining consistency and confidentiality requirements in first-order databases. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol.5735, pp. 121-134. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5735
, pp. 121-134
-
-
Biskup, J.1
Wiese, L.2
-
20
-
-
0029324246
-
Foundations of secure deductive databases
-
Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of secure deductive databases. IEEE Trans. Knowl. Data Eng. 7(3), 406-422 (1995)
-
(1995)
IEEE Trans. Knowl. Data Eng.
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.A.1
Kraus, S.2
Subrahmanian, V.S.3
-
21
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng. 12(6), 900-919 (2000)
-
(2000)
IEEE Trans. Knowl. Data Eng.
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
22
-
-
0035342199
-
Cover story management
-
Cuppens, F., Gabillon, A.: Cover story management. Data Knowl. Eng. 37(2), 177-201 (2001)
-
(2001)
Data Knowl. Eng.
, vol.37
, Issue.2
, pp. 177-201
-
-
Cuppens, F.1
Gabillon, A.2
-
23
-
-
0032657567
-
Specification and enforcement of classification and inference constraints
-
IEEE, Los Alamitos
-
Dawson, S., De Capitani di Vimercati, S., Samarati, P.: Specification and enforcement of classification and inference constraints. In: IEEE Symposium on Security and Privacy, pp. 181-195. IEEE, Los Alamitos (1999)
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 181-195
-
-
Dawson, S.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
24
-
-
24644431553
-
Policies, models, and languages for access control
-
Bhalla, S. (ed.) DNIS 2005. Springer, Heidelberg
-
De Capitani di Vimercati, S., Samarati, P., Jajodia, S.: Policies, models, and languages for access control. In: Bhalla, S. (ed.) DNIS 2005. LNCS, vol.3433, pp. 225-237. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3433
, pp. 225-237
-
-
De Capitani Di Vimercati, S.1
Samarati, P.2
Jajodia, S.3
-
25
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
ACM, New York
-
Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: a review and open problems. In: New Security Paradigms Workshop, NSPW 2001, pp. 13-22. ACM, New York (2001)
-
New Security Paradigms Workshop, NSPW 2001
, vol.2001
, pp. 13-22
-
-
Du, W.1
Atallah, M.J.2
-
26
-
-
57349187196
-
Epistemic privacy
-
ACM, New York
-
Evfimievski, A.V., Fagin, R., Woodruff, D.P.: Epistemic privacy. In: Principles of Database Systems, PODS 2008, pp. 171-180. ACM, New York (2008)
-
(2008)
Principles of Database Systems, PODS
, vol.2008
, pp. 171-180
-
-
Evfimievski, A.V.1
Fagin, R.2
Woodruff, D.P.3
-
27
-
-
12244265258
-
The inference problem: A survey
-
Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explorations 4(2), 6-11 (2002)
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
29
-
-
0004256091
-
-
2nd edn. John Wiley and Sons, Chichester
-
Gollmann, D.: Computer Security, 2nd edn. John Wiley and Sons, Chichester (2006)
-
(2006)
Computer Security
-
-
Gollmann, D.1
-
31
-
-
34247199424
-
An equational logic based approach to the security problem against inference attacks on object-oriented databases
-
Ishihara, Y., Morita, T., Seki, H., Ito, M.: An equational logic based approach to the security problem against inference attacks on object-oriented databases. J. Comput. Syst. Sci. 73(5), 788-817 (2007)
-
(2007)
J. Comput. Syst. Sci.
, vol.73
, Issue.5
, pp. 788-817
-
-
Ishihara, Y.1
Morita, T.2
Seki, H.3
Ito, M.4
-
32
-
-
0028755016
-
On the validity of the Bell-La Padula model
-
Lindgreen, E.R., Herschberg, I.S.: On the validity of the Bell-La Padula model. Computers & Security 13(4), 317-333 (1994)
-
(1994)
Computers & Security
, vol.13
, Issue.4
, pp. 317-333
-
-
Lindgreen, E.R.1
Herschberg, I.S.2
-
33
-
-
77951519649
-
-
11g Release 1 (11.1). B28286-03, Oracle Corporation
-
Lorentz, D., et al.: Oracle Database SQL Language Reference, 11g Release 1 (11.1). B28286-03, Oracle Corporation (2008), http://www.oracle.com/pls/db111/ to-pdf?partno=b28286
-
(2008)
Oracle Database SQL Language Reference
-
-
Lorentz, D.1
-
34
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: TKDD, vol.1(1) (2007)
-
(2007)
TKDD
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
35
-
-
33845891886
-
A formal analysis of information disclosure in data exchange
-
Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. J. Comput. Syst. Sci. 73(3), 507-534 (2007)
-
(2007)
J. Comput. Syst. Sci.
, vol.73
, Issue.3
, pp. 507-534
-
-
Miklau, G.1
Suciu, D.2
-
36
-
-
33748543201
-
Distributed usage control
-
Pretschner, A., Hilty, M., Basin, D.A.: Distributed usage control. Commun. ACM 49(9), 39-44 (2006)
-
(2006)
Commun. ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.A.3
-
37
-
-
57849100172
-
Mechanisms for usage control
-
ACM, New York
-
Pretschner, A., Hilty, M., Basin, D.A., Schaefer, C., Walter, T.: Mechanisms for usage control. In: Information, Computer and Communications Security, ASIACCS 2008, pp. 240-244. ACM, New York (2008)
-
(2008)
Information, Computer and Communications Security, ASIACCS 2008
, pp. 240-244
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.A.3
Schaefer, C.4
Walter, T.5
-
38
-
-
0020718929
-
Answering queries without revealing secrets
-
Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1), 41-59 (1983)
-
(1983)
ACM Trans. Database Syst.
, vol.8
, Issue.1
, pp. 41-59
-
-
Sicherman, G.L.1
De Jonge, W.2
Van De Riet, R.P.3
-
39
-
-
84914732721
-
Access control in a relational data base management system by query modification
-
ACM, New York
-
Stonebraker, M., Wong, E.: Access control in a relational data base management system by query modification. In: ACM/CSC-ER Annual Conference, pp. 180-186. ACM, New York (1974)
-
(1974)
ACM/CSC-ER Annual Conference
, pp. 180-186
-
-
Stonebraker, M.1
Wong, E.2
-
40
-
-
67650486144
-
Data privacy for knowledge bases
-
Artemov, S., Nerode, A. (eds.) LFCS 2009. Springer, Heidelberg
-
Stouppa, P., Studer, T.: Data privacy for knowledge bases. In: Artemov, S., Nerode, A. (eds.) LFCS 2009. LNCS, vol.5407, pp. 409-421. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5407
, pp. 409-421
-
-
Stouppa, P.1
Studer, T.2
-
44
-
-
0028720693
-
Formal query languages for secure relational databases
-
Winslett, M., Smith, K., Qian, X.: Formal query languages for secure relational databases. ACM Trans. Database Syst. 19(4), 626-662 (1994)
-
(1994)
ACM Trans. Database Syst.
, vol.19
, Issue.4
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
-
45
-
-
77049113795
-
Authorization views and conditional query containment
-
Eiter, T., Libkin, L. (eds.) ICDT 2005. Springer, Heidelberg
-
Zhang, Z., Mendelzon, A.O.: Authorization views and conditional query containment. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol.3363, pp. 259-273. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3363
, pp. 259-273
-
-
Zhang, Z.1
Mendelzon, A.O.2
|