메뉴 건너뛰기




Volumn 6818 LNCS, Issue , 2011, Pages 106-121

History-dependent inference control of queries by dynamic policy adaption

Author keywords

a priori knowledge; closed query; confidentiality policy; Controlled Query Evaluation; inference control; information system; interaction history; policy adaption; propositional logic; refusal; view

Indexed keywords

CLOSED QUERY; CONFIDENTIALITY POLICY; INFERENCE CONTROL; INTERACTION HISTORY; PRIORI KNOWLEDGE; PROPOSITIONAL LOGIC; QUERY EVALUATION; REFUSAL; VIEW;

EID: 79960204744     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22348-8_10     Document Type: Conference Paper
Times cited : (9)

References (11)
  • 2
    • 49049100147 scopus 로고
    • Secure computer systems: A mathematical model
    • reprint of MITRE Corporation
    • Bell, D.E., LaPadula, L.J.: Secure computer systems: A mathematical model, volume II. Journal of Computer Security 4(2/3), 229-263 (1996); reprint of MITRE Corporation (1974)
    • (1974) Journal of Computer Security , vol.2-4 , Issue.2-3 , pp. 229-263
    • Bell, D.E.1    LaPadula, L.J.2
  • 5
    • 77951549976 scopus 로고    scopus 로고
    • Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction execution
    • Kikuchi, S., Sachdeva, S., Bhalla, S. (eds.) DNIS 2010. Springer, Heidelberg
    • Biskup, J.: Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction execution. In: Kikuchi, S., Sachdeva, S., Bhalla, S. (eds.) DNIS 2010. LNCS, vol. 5999, pp. 80-106. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5999 , pp. 80-106
    • Biskup, J.1
  • 6
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14-27 (2004)
    • (2004) Int. J. Inf. Sec. , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 7
    • 46649105922 scopus 로고    scopus 로고
    • Protection of database security via collaborative inference detection
    • Chen, Y., Chu, W.W.: Protection of database security via collaborative inference detection. IEEE Trans. Knowl. Data Eng. 20(8), 1013-1027 (2008)
    • (2008) IEEE Trans. Knowl. Data Eng. , vol.20 , Issue.8 , pp. 1013-1027
    • Chen, Y.1    Chu, W.W.2
  • 9
    • 78049404569 scopus 로고    scopus 로고
    • A theory of runtime enforcement, with results
    • Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
    • Ligatti, J., Reddy, S.: A theory of runtime enforcement, with results. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 87- 100. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6345 , pp. 87-100
    • Ligatti, J.1    Reddy, S.2
  • 10


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.