메뉴 건너뛰기




Volumn 19, Issue 3, 2011, Pages 487-529

Inference-proof view update transactions with forwarded refreshments

Author keywords

A priori knowledge; confidentiality policy; controlled execution; controlled query evaluation; inference control; inference proof; information system; integrity constraint; lying approach; propositional logic; reversibility; security; transaction; view refreshment; view update

Indexed keywords

CONFIDENTIALITY POLICY; CONTROLLED EXECUTION; INFERENCE CONTROL; INFERENCE-PROOF; INTEGRITY CONSTRAINTS; LYING APPROACH; PRIORI KNOWLEDGE; PROPOSITIONAL LOGIC; QUERY EVALUATION; REVERSIBILITY; SECURITY; TRANSACTION; VIEW REFRESHMENT; VIEW UPDATE;

EID: 79959280117     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2011-0420     Document Type: Conference Paper
Times cited : (13)

References (44)
  • 2
  • 3
    • 77951549976 scopus 로고    scopus 로고
    • Usability confinement of server reactions maintaining inference-proof client views by controlled interaction execution
    • Lecture Notes in Computer Science, Springer
    • J. Biskup, Usability confinement of server reactions maintaining inference-proof client views by controlled interaction execution, in: Databases in Networked Information Systems, DNIS 2010, Lecture Notes in Computer Science, Vol. 5999, Springer, 2010, pp. 80-106.
    • (2010) Databases in Networked Information Systems, DNIS 2010 , vol.5999 , pp. 80-106
    • Biskup, J.1
  • 4
    • 0035425994 scopus 로고    scopus 로고
    • Lying versus refusal for known potential secrets
    • DOI 10.1016/S0169-023X(01)00024-6, PII S0169023X01000246
    • J. Biskup and P.A. Bonatti, Lying versus refusal for known potential secrets, Data Knowl. Eng. 38(2) (2001), 199-222. (Pubitemid 32698732)
    • (2001) Data and Knowledge Engineering , vol.38 , Issue.2 , pp. 199-222
    • Biskup, J.1    Bonatti, P.A.2
  • 5
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • J. Biskup and P.A. Bonatti, Controlled query evaluation for enforcing confidentiality in complete information systems, Int. J. Inf. Sec. 3(1) (2004), 14-27.
    • (2004) Int. J. Inf. Sec. , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 6
    • 0347756656 scopus 로고    scopus 로고
    • Controlled query evaluation for known policies by combining lying and refusal
    • DOI 10.1023/A:1026106029043
    • J. Biskup and P.A. Bonatti, Controlled query evaluation for known policies by combining lying and refusal, Ann. Math. Artif. Intell. 40(1,2) (2004), 37-62. (Pubitemid 38103547)
    • (2004) Annals of Mathematics and Artificial Intelligence , vol.40 , Issue.1-2 , pp. 37-62
    • Biskup, J.1    Bonatti, P.A.2
  • 7
    • 34547684253 scopus 로고    scopus 로고
    • Controlled query evaluation with open queries for a decidable relational submodel
    • J. Biskup and P.A. Bonatti, Controlled query evaluation with open queries for a decidable relational submodel, Ann. Math. Artif. Intell. 50(1,2) (2007), 39-77.
    • (2007) Ann. Math. Artif. Intell. , vol.50 , Issue.1-2 , pp. 39-77
    • Biskup, J.1    Bonatti, P.A.2
  • 8
    • 38849139678 scopus 로고    scopus 로고
    • Reducing inference control to access control for normalized database schemas
    • DOI 10.1016/j.ipl.2007.09.007, PII S0020019007002712
    • J. Biskup, D.W. Embley and J.-H. Lochner, Reducing inference control to access control for normalized database schemas, Inf. Process. Lett. 106(1) (2008), 8-12. (Pubitemid 351199847)
    • (2008) Information Processing Letters , vol.106 , Issue.1 , pp. 8-12
    • Biskup, J.1    Embley, D.W.2    Lochner, J.-H.3
  • 9
    • 70350400871 scopus 로고    scopus 로고
    • Requirements and protocols for inference-proof interactions in information systems
    • Lecture Notes in Computer Science, Springer
    • J. Biskup, C. Gogolin, J. Seiler and T. Weibert, Requirements and protocols for inference-proof interactions in information systems, in: 14th European Symposium on Research in Computer Security, ESORICS 2009, Lecture Notes in Computer Science, Vol. 5789, Springer, 2009, pp. 285-302.
    • (2009) 14th European Symposium on Research in Computer Security, ESORICS 2009 , vol.5789 , pp. 285-302
    • Biskup, J.1    Gogolin, C.2    Seiler, J.3    Weibert, T.4
  • 10
    • 38149019240 scopus 로고    scopus 로고
    • Enforcing confidentiality in relational databases by reducing inference control to access control
    • Lecture Notes in Computer Science, Springer
    • J. Biskup and J.-H. Lochner, Enforcing confidentiality in relational databases by reducing inference control to access control, in: 10th International Conference on Information Security, ISC 2007, Lecture Notes in Computer Science, Vol. 4779, Springer, 2007, pp. 407-422.
    • (2007) 10th International Conference on Information Security, ISC 2007 , vol.4779 , pp. 407-422
    • Biskup, J.1    Lochner, J.-H.2
  • 12
    • 70350389154 scopus 로고    scopus 로고
    • Controlled query evaluation and inference-free view updates
    • Lecture Notes in Computer Science, Springer
    • J. Biskup, J. Seiler and T. Weibert, Controlled query evaluation and inference-free view updates, in: Data and Applications Security XXIII, DBSec 2009, Lecture Notes in Computer Science, Vol. 5645, Springer, 2009, pp. 1-16.
    • (2009) Data and Applications Security XXIII, DBSec 2009 , vol.5645 , pp. 1-16
    • Biskup, J.1    Seiler, J.2    Weibert, T.3
  • 16
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosures
    • DOI 10.1109/69.895801
    • A. Brodsky, C. Farkas and S. Jajodia, Secure databases: Constraints, inference channels, and monitoring disclosures, IEEE Trans. Knowl. Data Eng. 12(6) (2000), 900-919. (Pubitemid 32130742)
    • (2000) IEEE Transactions on Knowledge and Data Engineering , vol.12 , Issue.6 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 17
    • 0033100756 scopus 로고    scopus 로고
    • Logical foundations of multilevel databases
    • F. Cuppens and A. Gabillon, Logical foundations of multilevel databases, Data Knowl. Eng. 29(3) (1999), 259-291.
    • (1999) Data Knowl. Eng. , vol.29 , Issue.3 , pp. 259-291
    • Cuppens, F.1    Gabillon, A.2
  • 18
    • 0035342199 scopus 로고    scopus 로고
    • Cover story management
    • DOI 10.1016/S0169-023X(01)00006-4, PII S0169023X01000064
    • F. Cuppens and A. Gabillon, Cover story management, Data Knowl. Eng. 37(2) (2001), 177-201. (Pubitemid 32287853)
    • (2001) Data and Knowledge Engineering , vol.37 , Issue.2 , pp. 177-201
    • Cuppens, F.1    Gabillon, A.2
  • 19
    • 0020183057 scopus 로고
    • On the correct translation of update operations on relational views
    • U. Dayal and P.A. Bernstein, On the correct translation of update operations on relational views, ACM Trans. Database Syst. 7(3) (1982), 381-416.
    • (1982) ACM Trans. Database Syst. , vol.7 , Issue.3 , pp. 381-416
    • Dayal, U.1    Bernstein, P.A.2
  • 23
    • 12244265258 scopus 로고    scopus 로고
    • The inference problem: A survey
    • C. Farkas and S. Jajodia, The inference problem: A survey, SIGKDD Explorations 4(2) (2002), 6-11.
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 24
    • 45949091693 scopus 로고    scopus 로고
    • The inference problem and updates in relational databases
    • IFIP Conference Proceedings, Kluwer, Dordrecht
    • C. Farkas, T.S. Toland and C.M. Eastman, The inference problem and updates in relational databases, in: Database and Application Security XV, DBSec 2001, IFIP Conference Proceedings, Vol. 215, Kluwer, Dordrecht, 2001, pp. 181-194.
    • (2001) Database and Application Security XV, DBSec 2001 , vol.215 , pp. 181-194
    • Farkas, C.1    Toland, T.S.2    Eastman, C.M.3
  • 26
    • 0026157130 scopus 로고
    • Toward a mathematical foundation for information flow security
    • J.W. Gray III, Toward a mathematical foundation for information flow security, in: IEEE Symposium on Security and Privacy, 1991, pp. 21-35.
    • (1991) IEEE Symposium on Security and Privacy , pp. 21-35
    • Gray III, J.W.1
  • 28
    • 0345863801 scopus 로고    scopus 로고
    • An order-based theory of updates for closed database views
    • DOI 10.1023/A:1026158013113
    • S.J. Hegner, An order-based theory of updates for closed database views, Ann. Math. Artif. Intell. 40(1,2) (2004), 63-125. (Pubitemid 38103548)
    • (2004) Annals of Mathematics and Artificial Intelligence , vol.40 , Issue.1-2 , pp. 63-125
    • Hegner, S.J.1
  • 31
    • 0025401306 scopus 로고
    • View updates in relational databases with an independent scheme
    • DOI 10.1145/77643.77645
    • R. Langerak, View updates in relational databases with an independent scheme, ACM Trans. Database Syst. 15(1) (1990), 40-66. (Pubitemid 20682807)
    • (1990) ACM Transactions on Database Systems , vol.15 , Issue.1 , pp. 40-66
    • Langerak Rom1
  • 34
    • 33845891886 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • DOI 10.1016/j.jcss.2006.10.004, PII S0022000006001127, Database Theory 2004
    • G. Miklau and D. Suciu, A formal analysis of information disclosure in data exchange, J. Comput. Syst. Sci. 73(3) (2007), 507-534. (Pubitemid 46027076)
    • (2007) Journal of Computer and System Sciences , vol.73 , Issue.3 , pp. 507-534
    • Miklau, G.1    Suciu, D.2
  • 37
    • 84949243805 scopus 로고    scopus 로고
    • Mathematical models of computer security
    • Foundations of Security Analysis and Design
    • P.Y.A. Ryan, Mathematical models of computer security, in: Foundations of Security Analysis and Design, FOSAD 2000, Lecture Notes in Computer Science, Vol. 2171, Springer, 2000, pp. 1-62. (Pubitemid 33364378)
    • (2001) Lecture Notes in Computer Science , Issue.2171 , pp. 1-62
    • Ryan, P.Y.A.1
  • 43
    • 0028720693 scopus 로고
    • Formal query languages for secure relational databases
    • M. Winslett, K. Smith and X. Qian, Formal query languages for secure relational databases, ACM Trans. Database Syst. 19(4) (1994), 626-662.
    • (1994) ACM Trans. Database Syst. , vol.19 , Issue.4 , pp. 626-662
    • Winslett, M.1    Smith, K.2    Qian, X.3
  • 44
    • 77049113795 scopus 로고    scopus 로고
    • Authorization views and conditional query containment
    • Lecture Notes in Computer Science, Springer
    • Z. Zhang and A.O. Mendelzon, Authorization views and conditional query containment, in: 10th International Conference on Database Theory, ICDT 2005, Lecture Notes in Computer Science, Vol. 3363, Springer, 2005, pp. 259-273.
    • (2005) 10th International Conference on Database Theory, ICDT 2005 , vol.3363 , pp. 259-273
    • Zhang, Z.1    Mendelzon, A.O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.