-
1
-
-
0003928313
-
-
Addison-Wesley, Reading, MA
-
S. Abiteboul, R. Hull and V. Vianu, Foundations of Databases, Addison-Wesley, Reading, MA, 1995.
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
3
-
-
77951549976
-
Usability confinement of server reactions maintaining inference-proof client views by controlled interaction execution
-
Lecture Notes in Computer Science, Springer
-
J. Biskup, Usability confinement of server reactions maintaining inference-proof client views by controlled interaction execution, in: Databases in Networked Information Systems, DNIS 2010, Lecture Notes in Computer Science, Vol. 5999, Springer, 2010, pp. 80-106.
-
(2010)
Databases in Networked Information Systems, DNIS 2010
, vol.5999
, pp. 80-106
-
-
Biskup, J.1
-
4
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
DOI 10.1016/S0169-023X(01)00024-6, PII S0169023X01000246
-
J. Biskup and P.A. Bonatti, Lying versus refusal for known potential secrets, Data Knowl. Eng. 38(2) (2001), 199-222. (Pubitemid 32698732)
-
(2001)
Data and Knowledge Engineering
, vol.38
, Issue.2
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.A.2
-
5
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
J. Biskup and P.A. Bonatti, Controlled query evaluation for enforcing confidentiality in complete information systems, Int. J. Inf. Sec. 3(1) (2004), 14-27.
-
(2004)
Int. J. Inf. Sec.
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
6
-
-
0347756656
-
Controlled query evaluation for known policies by combining lying and refusal
-
DOI 10.1023/A:1026106029043
-
J. Biskup and P.A. Bonatti, Controlled query evaluation for known policies by combining lying and refusal, Ann. Math. Artif. Intell. 40(1,2) (2004), 37-62. (Pubitemid 38103547)
-
(2004)
Annals of Mathematics and Artificial Intelligence
, vol.40
, Issue.1-2
, pp. 37-62
-
-
Biskup, J.1
Bonatti, P.A.2
-
7
-
-
34547684253
-
Controlled query evaluation with open queries for a decidable relational submodel
-
J. Biskup and P.A. Bonatti, Controlled query evaluation with open queries for a decidable relational submodel, Ann. Math. Artif. Intell. 50(1,2) (2007), 39-77.
-
(2007)
Ann. Math. Artif. Intell.
, vol.50
, Issue.1-2
, pp. 39-77
-
-
Biskup, J.1
Bonatti, P.A.2
-
8
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
DOI 10.1016/j.ipl.2007.09.007, PII S0020019007002712
-
J. Biskup, D.W. Embley and J.-H. Lochner, Reducing inference control to access control for normalized database schemas, Inf. Process. Lett. 106(1) (2008), 8-12. (Pubitemid 351199847)
-
(2008)
Information Processing Letters
, vol.106
, Issue.1
, pp. 8-12
-
-
Biskup, J.1
Embley, D.W.2
Lochner, J.-H.3
-
9
-
-
70350400871
-
Requirements and protocols for inference-proof interactions in information systems
-
Lecture Notes in Computer Science, Springer
-
J. Biskup, C. Gogolin, J. Seiler and T. Weibert, Requirements and protocols for inference-proof interactions in information systems, in: 14th European Symposium on Research in Computer Security, ESORICS 2009, Lecture Notes in Computer Science, Vol. 5789, Springer, 2009, pp. 285-302.
-
(2009)
14th European Symposium on Research in Computer Security, ESORICS 2009
, vol.5789
, pp. 285-302
-
-
Biskup, J.1
Gogolin, C.2
Seiler, J.3
Weibert, T.4
-
10
-
-
38149019240
-
Enforcing confidentiality in relational databases by reducing inference control to access control
-
Lecture Notes in Computer Science, Springer
-
J. Biskup and J.-H. Lochner, Enforcing confidentiality in relational databases by reducing inference control to access control, in: 10th International Conference on Information Security, ISC 2007, Lecture Notes in Computer Science, Vol. 4779, Springer, 2007, pp. 407-422.
-
(2007)
10th International Conference on Information Security, ISC 2007
, vol.4779
, pp. 407-422
-
-
Biskup, J.1
Lochner, J.-H.2
-
11
-
-
79959257426
-
Optimization of the controlled evaluation of closed relational queries
-
IFIP Series, Springer
-
J. Biskup, J.-H. Lochner and S. Sonntag, Optimization of the controlled evaluation of closed relational queries, in: IFIP Advances in Information and Communication Technology - Emerging Challenges for Security, Privacy and Trust, IFIP Series, Vol. 297, Springer, 2009, pp. 214-225.
-
(2009)
IFIP Advances in Information and Communication Technology - Emerging Challenges for Security, Privacy and Trust
, vol.297
, pp. 214-225
-
-
Biskup, J.1
Lochner, J.-H.2
Sonntag, S.3
-
12
-
-
70350389154
-
Controlled query evaluation and inference-free view updates
-
Lecture Notes in Computer Science, Springer
-
J. Biskup, J. Seiler and T. Weibert, Controlled query evaluation and inference-free view updates, in: Data and Applications Security XXIII, DBSec 2009, Lecture Notes in Computer Science, Vol. 5645, Springer, 2009, pp. 1-16.
-
(2009)
Data and Applications Security XXIII, DBSec 2009
, vol.5645
, pp. 1-16
-
-
Biskup, J.1
Seiler, J.2
Weibert, T.3
-
14
-
-
34250624952
-
Relational lenses: A language for updatable views
-
DOI 10.1145/1142351.1142399, Proceedings of the Twenty-Fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2006
-
A. Bohannon, B.C. Pierce and J.A. Vaughan, Relational lenses: a language for updatable views, in: Principles of Database Systems, PODS 2006, ACM, 2006, pp. 338-347. (Pubitemid 46946495)
-
(2006)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 338-347
-
-
Bohannon, A.1
Pierce, B.C.2
Vaughan, J.A.3
-
15
-
-
0029324246
-
Foundations of secure deductive databases
-
P.A. Bonatti, S. Kraus and V.S. Subrahmanian, Foundations of secure deductive databases, IEEE Trans. Knowl. Data Eng. 7(3) (1995), 406-422.
-
(1995)
IEEE Trans. Knowl. Data Eng.
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.A.1
Kraus, S.2
Subrahmanian, V.S.3
-
16
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
DOI 10.1109/69.895801
-
A. Brodsky, C. Farkas and S. Jajodia, Secure databases: Constraints, inference channels, and monitoring disclosures, IEEE Trans. Knowl. Data Eng. 12(6) (2000), 900-919. (Pubitemid 32130742)
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
17
-
-
0033100756
-
Logical foundations of multilevel databases
-
F. Cuppens and A. Gabillon, Logical foundations of multilevel databases, Data Knowl. Eng. 29(3) (1999), 259-291.
-
(1999)
Data Knowl. Eng.
, vol.29
, Issue.3
, pp. 259-291
-
-
Cuppens, F.1
Gabillon, A.2
-
18
-
-
0035342199
-
Cover story management
-
DOI 10.1016/S0169-023X(01)00006-4, PII S0169023X01000064
-
F. Cuppens and A. Gabillon, Cover story management, Data Knowl. Eng. 37(2) (2001), 177-201. (Pubitemid 32287853)
-
(2001)
Data and Knowledge Engineering
, vol.37
, Issue.2
, pp. 177-201
-
-
Cuppens, F.1
Gabillon, A.2
-
19
-
-
0020183057
-
On the correct translation of update operations on relational views
-
U. Dayal and P.A. Bernstein, On the correct translation of update operations on relational views, ACM Trans. Database Syst. 7(3) (1982), 381-416.
-
(1982)
ACM Trans. Database Syst.
, vol.7
, Issue.3
, pp. 381-416
-
-
Dayal, U.1
Bernstein, P.A.2
-
21
-
-
0023292280
-
Views for multilevel database security
-
D.E. Denning, S.G. Akl, M. Heckman, T.F. Lunt, M. Morgenstern, P.G. Neumann and R.R. Schell, Views for multilevel database security, IEEE Trans. Software Eng. 13(2) (1987), 129-140.
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 129-140
-
-
Denning, D.E.1
Akl, S.G.2
Heckman, M.3
Lunt, T.F.4
Morgenstern, M.5
Neumann, P.G.6
Schell, R.R.7
-
22
-
-
57349187196
-
Epistemic privacy
-
ACM
-
A.V. Evfimievski, R. Fagin and D.P. Woodruff, Epistemic privacy, in: Principles of Database Systems, PODS 2008, ACM, 2008, pp. 171-180.
-
(2008)
Principles of Database Systems, PODS 2008
, pp. 171-180
-
-
Evfimievski, A.V.1
Fagin, R.2
Woodruff, D.P.3
-
23
-
-
12244265258
-
The inference problem: A survey
-
C. Farkas and S. Jajodia, The inference problem: A survey, SIGKDD Explorations 4(2) (2002), 6-11.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
24
-
-
45949091693
-
The inference problem and updates in relational databases
-
IFIP Conference Proceedings, Kluwer, Dordrecht
-
C. Farkas, T.S. Toland and C.M. Eastman, The inference problem and updates in relational databases, in: Database and Application Security XV, DBSec 2001, IFIP Conference Proceedings, Vol. 215, Kluwer, Dordrecht, 2001, pp. 181-194.
-
(2001)
Database and Application Security XV, DBSec 2001
, vol.215
, pp. 181-194
-
-
Farkas, C.1
Toland, T.S.2
Eastman, C.M.3
-
26
-
-
0026157130
-
Toward a mathematical foundation for information flow security
-
J.W. Gray III, Toward a mathematical foundation for information flow security, in: IEEE Symposium on Security and Privacy, 1991, pp. 21-35.
-
(1991)
IEEE Symposium on Security and Privacy
, pp. 21-35
-
-
Gray III, J.W.1
-
28
-
-
0345863801
-
An order-based theory of updates for closed database views
-
DOI 10.1023/A:1026158013113
-
S.J. Hegner, An order-based theory of updates for closed database views, Ann. Math. Artif. Intell. 40(1,2) (2004), 63-125. (Pubitemid 38103548)
-
(2004)
Annals of Mathematics and Artificial Intelligence
, vol.40
, Issue.1-2
, pp. 63-125
-
-
Hegner, S.J.1
-
29
-
-
84976698642
-
Towards a multilevel secure relational data model
-
ACM
-
S. Jajodia and R.S. Sandhu, Towards a multilevel secure relational data model, in: International Conference on Management of Data, SIGMOD 1991, ACM, 1991, pp. 50-59.
-
(1991)
International Conference on Management of Data, SIGMOD 1991
, pp. 50-59
-
-
Jajodia, S.1
Sandhu, R.S.2
-
30
-
-
33244455692
-
Simulatable auditing
-
DOI 10.1145/1065167.1065183, Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2005
-
K. Kenthapadi, N. Mishra and K. Nissim, Simulatable auditing, in: Principles of Database Systems, PODS 2005, ACM, 2005, pp. 118-127. (Pubitemid 43275475)
-
(2005)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 118-127
-
-
Kenthapadi, K.1
Mishra, N.2
Nissim, K.3
-
31
-
-
0025401306
-
View updates in relational databases with an independent scheme
-
DOI 10.1145/77643.77645
-
R. Langerak, View updates in relational databases with an independent scheme, ACM Trans. Database Syst. 15(1) (1990), 40-66. (Pubitemid 20682807)
-
(1990)
ACM Transactions on Database Systems
, vol.15
, Issue.1
, pp. 40-66
-
-
Langerak Rom1
-
32
-
-
0025442003
-
The SeaView security model
-
T.F. Lunt, D.E. Denning, R.R. Schell, M. Heckman and W.R. Shockley, The SeaView security model, IEEE Trans. Software Eng. 16(6) (1990), 593-607.
-
(1990)
IEEE Trans. Software Eng.
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
34
-
-
33845891886
-
A formal analysis of information disclosure in data exchange
-
DOI 10.1016/j.jcss.2006.10.004, PII S0022000006001127, Database Theory 2004
-
G. Miklau and D. Suciu, A formal analysis of information disclosure in data exchange, J. Comput. Syst. Sci. 73(3) (2007), 507-534. (Pubitemid 46027076)
-
(2007)
Journal of Computer and System Sciences
, vol.73
, Issue.3
, pp. 507-534
-
-
Miklau, G.1
Suciu, D.2
-
35
-
-
52649162862
-
Auditing SQL queries
-
IEEE
-
R. Motwani, S.U. Nabar and D. Thomas, Auditing SQL queries, in: International Conference on Data Engineering, ICDE 2008, IEEE, 2008, pp. 287-296.
-
(2008)
International Conference on Data Engineering, ICDE 2008
, pp. 287-296
-
-
Motwani, R.1
Nabar, S.U.2
Thomas, D.3
-
36
-
-
84862604885
-
Towards robustness in query auditing
-
ACM
-
S.U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra and R. Motwani, Towards robustness in query auditing, in: Very Large Data Bases, VLDB 2006, ACM, 2006, pp. 151-162.
-
(2006)
Very Large Data Bases, VLDB 2006
, pp. 151-162
-
-
Nabar, S.U.1
Marthi, B.2
Kenthapadi, K.3
Mishra, N.4
Motwani, R.5
-
37
-
-
84949243805
-
Mathematical models of computer security
-
Foundations of Security Analysis and Design
-
P.Y.A. Ryan, Mathematical models of computer security, in: Foundations of Security Analysis and Design, FOSAD 2000, Lecture Notes in Computer Science, Vol. 2171, Springer, 2000, pp. 1-62. (Pubitemid 33364378)
-
(2001)
Lecture Notes in Computer Science
, Issue.2171
, pp. 1-62
-
-
Ryan, P.Y.A.1
-
38
-
-
85029488605
-
Polyinstantation for cover stories
-
Lecture Notes in Computer Science, Springer
-
R.S. Sandhu and S. Jajodia, Polyinstantation for cover stories, in: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Lecture Notes in Computer Science, Vol. 648, Springer, 1992, pp. 307-328.
-
(1992)
Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security
, vol.648
, pp. 307-328
-
-
Sandhu, R.S.1
Jajodia, S.2
-
39
-
-
33750235645
-
A formal framework for confidentiality-preserving refinement
-
Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings
-
T. Santen, A formal framework for confidentiality-preserving refinement, in: European Symposium on Research in Computer Security, ESORICS 2006, Lecture Notes in Computer Science, Vol. 4189, Springer, 2006, pp. 225-242. (Pubitemid 44609859)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4189
, pp. 225-242
-
-
Santen, T.1
-
41
-
-
38049174644
-
A formalmodel of data privacy
-
Lecture Notes in Computer Science, Springer
-
P. Stouppa and T. Studer, A formalmodel of data privacy, in: Perspectives of Systems Informatics, 6th International Andrei Ershov Memorial Conference, PSI 2006, Lecture Notes in Computer Science, Vol. 4378, Springer, 2007, pp. 400-408.
-
(2007)
Perspectives of Systems Informatics, 6th International Andrei Ershov Memorial Conference, PSI 2006
, vol.4378
, pp. 400-408
-
-
Stouppa, P.1
Studer, T.2
-
42
-
-
67650486144
-
Data privacy for knowledge bases
-
Lecture Notes in Computer Science, Springer
-
P. Stouppa and T. Studer, Data privacy for knowledge bases, in: International Symposium on Logical Foundations of Computer Science, LFCS 2009, Lecture Notes in Computer Science, Vol. 5407, Springer, 2009, pp. 409-421.
-
(2009)
International Symposium on Logical Foundations of Computer Science, LFCS 2009
, vol.5407
, pp. 409-421
-
-
Stouppa, P.1
Studer, T.2
-
43
-
-
0028720693
-
Formal query languages for secure relational databases
-
M. Winslett, K. Smith and X. Qian, Formal query languages for secure relational databases, ACM Trans. Database Syst. 19(4) (1994), 626-662.
-
(1994)
ACM Trans. Database Syst.
, vol.19
, Issue.4
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
-
44
-
-
77049113795
-
Authorization views and conditional query containment
-
Lecture Notes in Computer Science, Springer
-
Z. Zhang and A.O. Mendelzon, Authorization views and conditional query containment, in: 10th International Conference on Database Theory, ICDT 2005, Lecture Notes in Computer Science, Vol. 3363, Springer, 2005, pp. 259-273.
-
(2005)
10th International Conference on Database Theory, ICDT 2005
, vol.3363
, pp. 259-273
-
-
Zhang, Z.1
Mendelzon, A.O.2
|