메뉴 건너뛰기




Volumn 297, Issue , 2009, Pages 214-225

Optimization of the controlled evaluation of closed relational queries

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 79959257426     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-01244-0_19     Document Type: Conference Paper
Times cited : (9)

References (22)
  • 2
    • 19944380112 scopus 로고    scopus 로고
    • Database security-concepts, approaches, and challenges
    • Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Sec. Comput. 2(1), 2-18 (2005)
    • (2005) IEEE Trans. Dependable Sec. Comput. , vol.2 , Issue.1 , pp. 2-18
    • Bertino, E.1    Sandhu, R.2
  • 3
    • 0024960532 scopus 로고
    • Boyce-Codd normal form and object normal forms
    • Biskup, J.: Boyce-Codd normal form and object normal forms. Inf. Process. Lett. 32(1), 29-33 (1989)
    • (1989) Inf. Process. Lett. , vol.32 , Issue.1 , pp. 29-33
    • Biskup, J.1
  • 4
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • Biskup, J., Bonatti, P.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14-27 (2004)
    • (2004) Int. J. Inf. Sec. , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.2
  • 5
    • 34547684253 scopus 로고    scopus 로고
    • Controlled query evaluation with open queries for a decidable relational submodel
    • Biskup, J., Bonatti, P.: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50, 39-77 (2007)
    • (2007) Ann. Math. Artif. Intell. , vol.50 , pp. 39-77
    • Biskup, J.1    Bonatti, P.2
  • 6
    • 0035425994 scopus 로고    scopus 로고
    • Lying versus refusal for known potential secrets
    • Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38, 199-222 (2001)
    • (2001) Data Knowl. Eng. , vol.38 , pp. 199-222
    • Biskup, J.1    Bonatti, P.A.2
  • 7
    • 0347756656 scopus 로고    scopus 로고
    • Controlled query evaluation for known policies by combining lying and refusal
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40, 37-62 (2004)
    • (2004) Ann. Math. Artif. Intell. , vol.40 , pp. 37-62
    • Biskup, J.1    Bonatti, P.A.2
  • 8
    • 38849139678 scopus 로고    scopus 로고
    • Reducing inference control to access control for normalized database schemas
    • Biskup, J., Embley, D.W., Lochner, J.-H.: Reducing inference control to access control for normalized database schemas. Inf. Process. Lett. 106(1), 8-12 (2008)
    • (2008) Inf. Process. Lett. , vol.106 , Issue.1 , pp. 8-12
    • Biskup, J.1    Embley, D.W.2    Lochner, J.-H.3
  • 9
    • 38149019240 scopus 로고    scopus 로고
    • Enforcing confidentiality in relational databases by reducing inference control to access control
    • In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) Springer, Heidelberg
    • Biskup, J., Lochner, J.-H.: Enforcing confidentiality in relational databases by reducing inference control to access control. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 407-422. Springer, Heidelberg (2007)
    • (2007) ISC 2007. LNCS , vol.4779 , pp. 407-422
    • Biskup, J.1    Lochner, J.-H.2
  • 11
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosures
    • Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng. 12(6), 900-919 (2000)
    • (2000) IEEE Trans. Knowl. Data Eng. , vol.12 , Issue.6 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 12
    • 33644919398 scopus 로고    scopus 로고
    • Micro-views, or on how to protect privacy while enhancing data usability-concepts and challenges
    • Byun, J.W., Bertino, E.: Micro-views, or on how to protect privacy while enhancing data usability-concepts and challenges. ACM SIGMOD Record 35(1), 9-13 (2006)
    • (2006) ACM SIGMOD Record , vol.35 , Issue.1 , pp. 9-13
    • Byun, J.W.1    Bertino, E.2
  • 13
    • 0035342199 scopus 로고    scopus 로고
    • Cover story management
    • Cuppens, F., Gabillon, A.: Cover story management. Data Knowl. Eng. 37(2), 177-201 (2001)
    • (2001) Data Knowl. Eng. , vol.37 , Issue.2 , pp. 177-201
    • Cuppens, F.1    Gabillon, A.2
  • 14
    • 0032657567 scopus 로고    scopus 로고
    • Specification and enforcement of classification and inference constraints
    • In: IEEE Computer Society, Los Alamitos
    • Dawson, S., De Capitani di Vimercati, S., Samarati, P.: Specification and enforcement of classification and inference constraints. In: IEEE Symposium on Security and Privacy, pp. 181-195. IEEE Computer Society, Los Alamitos (1999)
    • (1999) IEEE Symposium on Security and Privacy , pp. 181-195
    • Dawson, S.1    De Capitani di Vimercati, S.2    Samarati, P.3
  • 15
    • 12244265258 scopus 로고    scopus 로고
    • The inference problem: A survey
    • Farkas, C., Jajodia, S.: The inference problem: a survey. SIGKDD Explorations 4(2), 6-11 (2002)
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 16
    • 84976657250 scopus 로고
    • An authorization mechanism for a relational database system
    • Griffiths, P.P., Wade, B.W.: An authorization mechanism for a relational database system. ACM Trans. Database Syst. 1(3), 242-255 (1976)
    • (1976) ACM Trans. Database Syst. , vol.1 , Issue.3 , pp. 242-255
    • Griffiths, P.P.1    Wade, B.W.2
  • 17
    • 84976698642 scopus 로고
    • Toward a multilevel secure relational data model
    • In: ACM, New York
    • Jajodia, S., Sandhu, R.S.: Toward a multilevel secure relational data model. In: SIGMOD Conference, pp. 50-59. ACM, New York (1991)
    • (1991) SIGMOD Conference , pp. 50-59
    • Jajodia, S.1    Sandhu, R.S.2
  • 20
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu, R.: Lattice-based access control models. Computer 26(11), 9-19 (1993)
    • (1993) Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.