-
1
-
-
0003928313
-
-
Addison-Wesley, Reading
-
Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
2
-
-
19944380112
-
Database security - Concepts, approaches, and challenges
-
Bertino, E., Sandhu, R.: Database security - concepts, approaches, and challenges. IEEE Trans. Dependable Sec. Comput. 2(1), 2-18 (2005)
-
(2005)
IEEE Trans. Dependable Sec. Comput.
, vol.2
, Issue.1
, pp. 2-18
-
-
Bertino, E.1
Sandhu, R.2
-
3
-
-
0024960532
-
Boyce-codd normal form and object normal forms
-
Biskup, J.: Boyce-Codd normal form and object normal forms. Inf. Process. Lett. 32(1), 29-33 (1989)
-
(1989)
Inf. Process. Lett.
, vol.32
, Issue.1
, pp. 29-33
-
-
Biskup, J.1
-
4
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Biskup, J., Bonatti, P.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14-27 (2004)
-
(2004)
Int. J. Inf. Sec
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.2
-
5
-
-
34547684253
-
Controlled query evaluation with open queries for a decidable relational submodel
-
Biskup, J., Bonatti, P.: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50, 39-77 (2007)
-
(2007)
Ann. Math. Artif. Intell
, vol.50
, pp. 39-77
-
-
Biskup, J.1
Bonatti, P.2
-
6
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
Biskup, J., Bonatti, P. A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2), 199-222 (2001)
-
(2001)
Data Knowl. Eng.
, vol.38
, Issue.2
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.A.2
-
7
-
-
0347756656
-
Controlled query evaluation for known policies by combining lying and refusal
-
Biskup, J., Bonatti, P. A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40, 37-62 (2004)
-
(2004)
Ann. Math. Artif. Intell
, vol.40
, pp. 37-62
-
-
Biskup, J.1
Bonatti, P.A.2
-
8
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
Biskup, J., Embley, D. W., Lochner, J.-H.: Reducing inference control to access control for normalized database schemas. Inf. Process. Lett. 106(1), 8-12 (2008)
-
(2008)
Inf. Process. Lett.
, vol.106
, Issue.1
, pp. 8-12
-
-
Biskup, J.1
Embley, D.W.2
Lochner, J.-H.3
-
9
-
-
38149019240
-
Enforcing confidentiality in relational databases by reducing inference control to access control
-
Garay, J. A., Lenstra, A. K., Mambo, M., Peralta, R. eds., Springer, Heidelberg, ISC 2007
-
Biskup, J., Lochner, J.-H.: Enforcing confidentiality in relational databases by reducing inference control to access control. In: Garay, J. A., Lenstra, A. K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 407-422. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4779
, pp. 407-422
-
-
Biskup, J.1
Lochner, J.-H.2
-
10
-
-
79959257426
-
Optimization of the controlled evaluation of closed relational queries
-
Gritzalis, D., Lopez, J. eds., Springer, Heidelberg
-
Biskup, J., Lochner, J.-H., Sonntag, S.: Optimization of the controlled evaluation of closed relational queries. In: Gritzalis, D., Lopez, J. (eds.) Proc. IFIP SEC. IFIP AICT, vol. 297, pp. 214-225. Springer, Heidelberg (2009)
-
(2009)
Proc. IFIP SEC. IFIP AICT
, vol.297
, pp. 214-225
-
-
Biskup, J.1
Lochner, J.-H.2
Sonntag, S.3
-
11
-
-
0029324246
-
Foundations of secure deductive databases
-
Bonatti, P., Kraus, S., Subrahmanian, V. S.: Foundations of secure deductive databases. IEEE Trans. Knowl. Data Eng. 7(3), 406-422 (1995)
-
(1995)
IEEE Trans. Knowl. Data Eng.
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.1
Kraus, S.2
Subrahmanian, V.S.3
-
12
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng. 12(6), 900-919 (2000)
-
(2000)
IEEE Trans. Knowl. Data Eng.
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
13
-
-
33644919398
-
Micro-views, or on how to protect privacy while enhancing data usability-concepts and challenges
-
Byun, J.-W., Bertino, E.: Micro-views, or on how to protect privacy while enhancing data usability-concepts and challenges. ACM SIGMOD Record 35(1), 9-13 (2006)
-
(2006)
ACM SIGMOD Record
, vol.35
, Issue.1
, pp. 9-13
-
-
Byun, J.-W.1
Bertino, E.2
-
14
-
-
0035342199
-
Cover story management
-
Cuppens, F., Gabillon, A.: Cover story management. Data Knowl. Eng. 37(2), 177-201 (2001)
-
(2001)
Data Knowl. Eng.
, vol.37
, Issue.2
, pp. 177-201
-
-
Cuppens, F.1
Gabillon, A.2
-
15
-
-
0032657567
-
Specification and enforcement of classification and inference constraints
-
Dawson, S., De Capitani di Vimercati, S., Samarati, P.: Specification and enforcement of classification and inference constraints. In: IEEE Symposium on Security and Privacy, pp. 181-195 (1999)
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 181-195
-
-
Dawson, S.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
16
-
-
0030085404
-
Wizard: A database inference analysis and detection system
-
Delugach, H. S., Hinke, T. H.: Wizard: A database inference analysis and detection system. IEEE Trans. Knowl. Data Eng. 8(1), 56-66 (1996)
-
(1996)
IEEE Trans. Knowl. Data Eng.
, vol.8
, Issue.1
, pp. 56-66
-
-
Delugach, H.S.1
Hinke, T.H.2
-
17
-
-
12244265258
-
The inference problem: A survey
-
Farkas, C., Jajodia, S.: The inference problem: a survey. SIGKDD Explorations 4(2), 6-11 (2002)
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
18
-
-
48349096494
-
Polyinstantiation in relational databases with multilevel security
-
IEEE, los Alamitos
-
Galinovic, A., Antoncic, V.: Polyinstantiation in relational databases with multilevel security. In: Proc. ITI, pp. 127-132. IEEE, los Alamitos (2007)
-
(2007)
Proc. ITI
, pp. 127-132
-
-
Galinovic, A.1
Antoncic, V.2
-
19
-
-
84976657250
-
An authorization mechanism for a relational database system
-
Griffiths, P. P., Wade, B. W.: An authorization mechanism for a relational database system. ACM Trans. Database Syst. 1(3), 242-255 (1976)
-
(1976)
ACM Trans. Database Syst.
, vol.1
, Issue.3
, pp. 242-255
-
-
Griffiths, P.P.1
Wade, B.W.2
-
20
-
-
0030104451
-
Analyzing FD inference in relational databases
-
Hale, J., Shenoi, S.: Analyzing FD inference in relational databases. Data Knowl. Eng. 18(2), 167-183 (1996)
-
(1996)
Data Knowl. Eng.
, vol.18
, Issue.2
, pp. 167-183
-
-
Hale, J.1
Shenoi, S.2
-
21
-
-
84976698642
-
Toward a multilevel secure relational data model
-
Clifford, J., King, R. eds., ACM Press, New York
-
Jajodia, S., Sandhu, R. S.: Toward a multilevel secure relational data model. In: Clifford, J., King, R. (eds.) SIGMOD Conference, pp. 50-59. ACM Press, New York (1991)
-
(1991)
SIGMOD Conference
, pp. 50-59
-
-
Jajodia, S.1
Sandhu, R.S.2
-
22
-
-
0025442003
-
The Sea-view security model
-
Lunt, T. F., Denning, D. E., Schell, R. R., Heckman, M., Shockley, W. R.: The Sea-View security model. IEEE Trans. Software Eng. 16(6), 593-607 (1990)
-
(1990)
IEEE Trans. Software Eng.
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
23
-
-
85136028696
-
A multi-purpose implementation of mandatory access control in relational database management systems
-
Nascimento, M. A., Özsu, M. T., Kossmann, D., Miller, R. J., Blakeley, J. A., Schiefer, K. B. eds.
-
Rjaibi, W., Bird, P.: A multi-purpose implementation of mandatory access control in relational database management systems. In: Nascimento, M. A., Özsu, M. T., Kossmann, D., Miller, R. J., Blakeley, J. A., Schiefer, K. B. (eds.) Proc. VLDB, pp. 1010-1020 (2004)
-
(2004)
Proc. VLDB
, pp. 1010-1020
-
-
Rjaibi, W.1
Bird, P.2
-
24
-
-
0027699087
-
Lattice-based access control models
-
Sandhu, R.: Lattice-based access control models. Computer 26(11), 9-19 (1993)
-
(1993)
Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.1
-
25
-
-
0020718929
-
Answering queries without revealing secrets
-
Sicherman, G. L., de Jonge, W., van de Riet, R. P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1), 41-59 (1983)
-
(1983)
ACM Trans. Database Syst.
, vol.8
, Issue.1
, pp. 41-59
-
-
Sicherman, G.L.1
De Jonge, W.2
Van De Riet, R.P.3
-
26
-
-
84914732721
-
Access control in a relational data base management system by query modification
-
ACM Press, New York
-
Stonebraker, M., Wong, E.: Access control in a relational data base management system by query modification. In: Proc. ACM/CSC-ER Annual Conference, pp. 180-186. ACM Press, New York (1974)
-
(1974)
Proc. ACM/CSC-ER Annual Conference
, pp. 180-186
-
-
Stonebraker, M.1
Wong, E.2
-
27
-
-
0026367603
-
Controlling FD and MVD inferences in multilevel relational database systems
-
Su, T.-A., Özsoyoglu, G.: Controlling FD and MVD inferences in multilevel relational database systems. IEEE Trans. Knowl. Data Eng. 3(4), 474-485 (1991)
-
(1991)
IEEE Trans. Knowl. Data Eng.
, vol.3
, Issue.4
, pp. 474-485
-
-
Su, T.-A.1
Özsoyoglu, G.2
|