메뉴 건너뛰기




Volumn 7001 LNCS, Issue , 2011, Pages 246-261

On the inference-proofness of database fragmentation satisfying confidentiality constraints

Author keywords

Database Security; First Order Logic; Fragmentation; Inference Proofness; Information Dissemination Control; Outsourcing

Indexed keywords

CONFIDENTIAL INFORMATION; DATA OUTSOURCING; DATABASE CONSTRAINTS; DATABASE SECURITY; FIRST ORDER LOGIC; FRAGMENTATION; GENERAL CLASS; INFERENCE-PROOFNESS; PRIORI KNOWLEDGE; QUERY EVALUATION; SENSITIVE INFORMATIONS;

EID: 80054794829     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-24861-0_17     Document Type: Conference Paper
Times cited : (21)

References (14)
  • 4
    • 77951549976 scopus 로고    scopus 로고
    • Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction execution
    • Kikuchi, S., Sachdeva, S., Bhalla, S. (eds.) DNIS 2010. Springer, Heidelberg
    • Biskup, J.: Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction execution. In: Kikuchi, S., Sachdeva, S., Bhalla, S. (eds.) DNIS 2010. LNCS, vol. 5999, pp. 80-106. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5999 , pp. 80-106
    • Biskup, J.1
  • 5
    • 34547684253 scopus 로고    scopus 로고
    • Controlled query evaluation with open queries for a decidable relational submodel
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. Annals of Mathematics and Artificial Intelligence 50(1-2), 39-77 (2007)
    • (2007) Annals of Mathematics and Artificial Intelligence , vol.50 , Issue.1-2 , pp. 39-77
    • Biskup, J.1    Bonatti, P.A.2
  • 6
    • 38849139678 scopus 로고    scopus 로고
    • Reducing inference control to access control for normalized database schemas
    • Biskup, J., Embley, D.W., Lochner, J.: Reducing inference control to access control for normalized database schemas. Information Processing Letters 106(1), 8-12 (2008)
    • (2008) Information Processing Letters , vol.106 , Issue.1 , pp. 8-12
    • Biskup, J.1    Embley, D.W.2    Lochner, J.3
  • 7
    • 70350370035 scopus 로고    scopus 로고
    • Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients
    • Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. Springer, Heidelberg
    • Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security XXIII. LNCS, vol. 5645, pp. 225-239. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5645 , pp. 225-239
    • Ciriani, V.1    De Capitani Di Vimercati, S.2    Foresti, S.3    Jajodia, S.4    Paraboschi, S.5    Samarati, P.6
  • 8
    • 70350355128 scopus 로고    scopus 로고
    • Keep a few: Outsourcing data while maintaining confidentiality
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: Outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 440-455. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 440-455
    • Ciriani, V.1    De Capitani Di Vimercati, S.2    Foresti, S.3    Jajodia, S.4    Paraboschi, S.5    Samarati, P.6
  • 10
    • 0020191157 scopus 로고
    • Horn clauses and database dependencies
    • Fagin, R.: Horn clauses and database dependencies. Journal of the ACM 29(4), 952-985 (1982)
    • (1982) Journal of the ACM , vol.29 , Issue.4 , pp. 952-985
    • Fagin, R.1
  • 14
    • 78649986957 scopus 로고    scopus 로고
    • Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints
    • Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. Springer, Heidelberg
    • Wiese, L.: Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints. In: Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. LNCS, vol. 6434, pp. 101-116. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6434 , pp. 101-116
    • Wiese, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.