-
1
-
-
0002848811
-
The specification and enforcement of authorization constraints in work flow management systems
-
Bertino, E., Ferrari, E. and Atluri, V. (1999) 'The specification and enforcement of authorization constraints in work flow management systems', ACM Trans. Inf. Syst. Secur., Vol. 2, No. 1, pp.65-104.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
2
-
-
1142309815
-
Provisions and obligations in policy management and security applications', in Very Large Data Bases
-
Morgan Kaufmann
-
Bettini, C., Jajodia, S., Wang, X.S. and Wijesekera, D. (2002) 'Provisions and obligations in policy management and security applications', in Very Large Data Bases, VLDB, pp.502-513, Morgan Kaufmann.
-
(2002)
VLDB
, pp. 502-513
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
3
-
-
0034174093
-
For unknown secrecies refusal is better than lying
-
DOI 10.1016/S0169-023X(99)00043-9
-
Biskup, J. (2000) 'For unknown secrecies refusal is better than lying', Data Knowl. Eng., Vol. 33, No. 1, pp.1-23. (Pubitemid 30568314)
-
(2000)
Data and Knowledge Engineering
, vol.33
, Issue.1
, pp. 1-23
-
-
Biskup, J.1
-
5
-
-
77951549976
-
Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction executions
-
of Lecture Notes in Computer Science, Springer
-
Biskup, J. (2010) 'Usability confinement of server reactions: maintaining inference-proof client views by controlled interaction executions', in 6th International Workshop Databases in Networked Information Systems, DNIS, Vol. 5999 of Lecture Notes in Computer Science, pp.80-106, Springer.
-
(2010)
6th International Workshop Databases in Networked Information Systems, DNIS
, vol.5999
, pp. 80-106
-
-
Biskup, J.1
-
6
-
-
79960204744
-
History-dependent inference control of queries by dynamic policy adaption
-
of Lecture Notes in Computer Science, IFIP/Springer
-
Biskup, J. (2011) 'History-dependent inference control of queries by dynamic policy adaption', in 25th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, DBSec, Vol. 6818 of Lecture Notes in Computer Science, pp.108-123, IFIP/Springer.
-
(2011)
25th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, DBSec
, vol.6818
, pp. 108-123
-
-
Biskup, J.1
-
7
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
DOI 10.1016/S0169-023X(01)00024-6, PII S0169023X01000246
-
Biskup, J. and Bonatti, P.A. (2001) 'Lying versus refusal for known potential secrets', Data Knowl. Eng., Vol. 38, No. 2, pp.199-222. (Pubitemid 32698732)
-
(2001)
Data and Knowledge Engineering
, vol.38
, Issue.2
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.A.2
-
8
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Biskup, J. and Bonatti, P.A. (2004a) 'Controlled query evaluation for enforcing confidentiality in complete information systems', Int. J. Inf. Sec., Vol. 3, No. 1, pp.14-27.
-
(2004)
Int. J. Inf. Sec.
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
9
-
-
0347756656
-
Controlled query evaluation for known policies by combining lying and refusal
-
DOI 10.1023/A:1026106029043
-
Biskup, J. and Bonatti, P.A. (2004b) 'Controlled query evaluation for known policies by combining lying and refusal', Ann. Math. Artif. Intell., Vol. 40, Nos. 1-2, pp.37-62. (Pubitemid 38103547)
-
(2004)
Annals of Mathematics and Artificial Intelligence
, vol.40
, Issue.1-2
, pp. 37-62
-
-
Biskup, J.1
Bonatti, P.A.2
-
10
-
-
34547684253
-
Controlled query evaluation with open queries for a decidable relational submodel
-
Biskup, J. and Bonatti, P.A. (2007) 'Controlled query evaluation with open queries for a decidable relational submodel', Ann. Math. Artif. Intell., Vol. 50, Nos. 1-2, pp.39-77.
-
(2007)
Ann. Math. Artif. Intell.
, vol.50
, Issue.1-2
, pp. 39-77
-
-
Biskup, J.1
Bonatti, P.A.2
-
11
-
-
38149011376
-
Inference control in logic databases as a constraint satisfaction problem
-
of Lecture Notes in Computer Science, 128-142, Springer
-
Biskup, J., Burgard, D.M., Weibert, T. and Wiese, L. (2007) 'Inference control in logic databases as a constraint satisfaction problem', in Third International Conference on Information Systems Security, ICISS, Vol. 4812 of Lecture Notes in Computer Science, pp.128-142, Springer.
-
(2007)
Third International Conference on Information Systems Security, ICISS
, vol.4812
-
-
Biskup, J.1
Burgard, D.M.2
Weibert, T.3
Wiese, L.4
-
12
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
DOI 10.1016/j.ipl.2007.09.007, PII S0020019007002712
-
Biskup, J., Embley, D.W. and Lochner, J-H. (2008) 'Reducing inference control to access control for normalized database schemas', Inf. Process. Lett., Vol. 106, No. 1, pp.8-12. (Pubitemid 351199847)
-
(2008)
Information Processing Letters
, vol.106
, Issue.1
, pp. 8-12
-
-
Biskup, J.1
Embley, D.W.2
Lochner, J.-H.3
-
13
-
-
70350400871
-
Requirements and protocols for inference-proof interactions in information systems
-
of Lecture Notes in Computer Science Springer
-
Biskup, J., Gogolin, C., Seiler, J. and Weibert, T. (2009a) 'Requirements and protocols for inference-proof interactions in information systems', in 14th European Symposium on Research in Computer Security, ESORICS, Vol. 5789 of Lecture Notes in Computer Science, pp.285-302, Springer.
-
(2009)
14th European Symposium on Research in Computer Security, ESORICS
, vol.5789
, pp. 285-302
-
-
Biskup, J.1
Gogolin, C.2
Seiler, J.3
Weibert, T.4
-
14
-
-
79959257426
-
Optimization of the controlled evaluation of closed relational queries
-
of IFIP Series Springer
-
Biskup, J., Lochner, J-H. and Sonntag, S. (2009b) 'Optimization of the controlled evaluation of closed relational queries', in Advances in Information and Communication Technology-Emerging Challenges for Security, Privacy and Trust, IFIP, Vol. 297 of IFIP Series, pp.214-225, Springer.
-
(2009)
Advances in Information and Communication Technology-Emerging Challenges for Security, Privacy and Trust, IFIP
, vol.297
, pp. 214-225
-
-
Biskup, J.1
Lochner, J.-H.2
Sonntag, S.3
-
15
-
-
70350389154
-
Controlled query evaluation and inference-free view updates
-
of Lecture Notes in Computer Science Springer
-
Biskup, J., Seiler, J. and Weibert, T. (2009c) 'Controlled query evaluation and inference-free view updates', in Data and Applications Security XXIII, DBSec, Vol. 5645 of Lecture Notes in Computer Science, pp.1-16, Springer.
-
(2009)
Data and Applications Security XXIII, DBSec
, vol.5645
, pp. 1-16
-
-
Biskup, J.1
Seiler, J.2
Weibert, T.3
-
16
-
-
84872251833
-
Chasing after secrets in relational databases
-
of CEUR Workshop Proceedings
-
Biskup, J., Hartmann, S., Link, S. and Lochner, J-H. (2010a) 'Chasing after secrets in relational databases', in 4th Alberto Mendelzon International Workshop on Foundations of Data Management, AMW, Vol. 619 of CEUR Workshop Proceedings, pp.13.1-13.12.
-
(2010)
4th Alberto Mendelzon International Workshop on Foundations of Data Management, AMW
, vol.619
, pp. 131-1312
-
-
Biskup, J.1
Hartmann, S.2
Link, S.3
Lochner, J.-H.4
-
17
-
-
77958513273
-
Efficient inference control for open relational queries
-
of Lecture Notes in Computer Science, IFIP/Springer
-
Biskup, J., Hartmann, S., Link, S. and Lochner, J-H. (2010b) 'Efficient inference control for open relational queries', in 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, DBSec, Vol. 6166 of Lecture Notes in Computer Science, pp.162-176, IFIP/Springer.
-
(2010)
24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, DBSec
, vol.6166
, pp. 162-176
-
-
Biskup, J.1
Hartmann, S.2
Link, S.3
Lochner, J.-H.4
-
18
-
-
38149019240
-
Enforcing confidentiality in relational databases by reducing inference control to access control
-
of Lecture Notes in Computer Science Springer
-
Biskup, J. and Lochner, J-H. (2007) 'Enforcing confidentiality in relational databases by reducing inference control to access control', in 10th International Conference on Information Security, ISC, Vol. 4779 of Lecture Notes in Computer Science, pp.407-422, Springer.
-
(2007)
10th International Conference on Information Security, ISC
, vol.4779
, pp. 407-422
-
-
Biskup, J.1
Lochner, J.-H.2
-
19
-
-
79959280117
-
Inference-proof view update transactions with forwarded refreshments
-
Biskup, J., Gogolin, C., Seiler, J. and Weibert, T. (2011a) 'Inference-proof view update transactions with forwarded refreshments', Journal of Computer Security, Vol. 19, pp.487-529.
-
(2011)
Journal of Computer Security
, vol.19
, pp. 487-529
-
-
Biskup, J.1
Gogolin, C.2
Seiler, J.3
Weibert, T.4
-
20
-
-
80054794829
-
On the inferenceproofness of database fragmentation satisfying confidentiality constraints
-
Lai, X., Zhou, J. and Li, H. (Eds.): of Lecture Notes in Computer Science, Springer
-
Biskup, J., Preuss, M. and Wiese, L. (2011b) 'On the inferenceproofness of database fragmentation satisfying confidentiality constraints', in Lai, X., Zhou, J. and Li, H. (Eds.): Information Security, ISC 2011, Vol. 7001 of Lecture Notes in Computer Science, pp.246-261, Springer.
-
(2011)
Information Security, ISC 2011
, vol.7001
, pp. 246-261
-
-
Biskup, J.1
Preuss, M.2
Wiese, L.3
-
21
-
-
84859397510
-
Policy-based secrecy in the Runs & Systems Framework and controlled query evaluation
-
IWSEC, Information Processing Society of Japan
-
Biskup, J. and Tadros, C. (2010) 'Policy-based secrecy in the Runs & Systems Framework and controlled query evaluation', in 5th International Workshop on Security (short papers), IWSEC, pp.60-77, Information Processing Society of Japan.
-
(2010)
5th International Workshop on Security (Short Papers)
, pp. 60-77
-
-
Biskup, J.1
Tadros, C.2
-
22
-
-
84903848955
-
Inference-proof view update transactions with minimal refusals
-
Garcia-Alfaro J. and Navarro-Arribas G. Cuppens-Boulahia N. and De Capitani di Vimercati S. (Eds.):, to appear of Lecture Notes in Computer Science, Springer
-
Biskup, J. and Tadros, C. (2011) 'Inference-proof view update transactions with minimal refusals', in Garcia-Alfaro, J. and Navarro-Arribas, G., Cuppens-Boulahia, N. and De Capitani di Vimercati, S. (Eds.): DPM 2011/SETOP 2011, to appear, Vol. 7122 of Lecture Notes in Computer Science, Springer.
-
(2011)
DPM 2011/SETOP 2011
, vol.7122
-
-
Biskup, J.1
Tadros, C.2
-
23
-
-
77951113434
-
Towards controlled query evaluation for incomplete first-order databases
-
of Lecture Notes in Computer Science Springer
-
Biskup, J., Tadros, C. and Wiese, L. (2010) 'Towards controlled query evaluation for incomplete first-order databases', in Sixth International Symposium on Foundations of Information and Knowledge Systems, FOIKS, Vol. 5956 of Lecture Notes in Computer Science, pp.230-247, Springer.
-
(2010)
Sixth International Symposium on Foundations of Information and Knowledge Systems, FOIKS
, vol.5956
, pp. 230-247
-
-
Biskup, J.1
Tadros, C.2
Wiese, L.3
-
24
-
-
37849036071
-
Confidentiality policies for controlled query evaluation
-
of Lecture Notes in Computer Science Springer
-
Biskup, J. and Weibert, T. (2007) 'Confidentiality policies for controlled query evaluation', in Data and Applications Security XXI, DBSec, Vol. 4602 of Lecture Notes in Computer Science, pp.1-13, Springer.
-
(2007)
Data and Applications Security XXI, DBSec
, vol.4602
, pp. 1-13
-
-
Biskup, J.1
Weibert, T.2
-
25
-
-
44249126774
-
Keeping secrets in incomplete databases
-
DOI 10.1007/s10207-007-0037-7
-
Biskup, J. and Weibert, T. (2008) 'Keeping secrets in incomplete databases', Int. J. Inf. Sec., Vol. 7, No. 3, pp.199-217. (Pubitemid 351722211)
-
(2008)
International Journal of Information Security
, vol.7
, Issue.3
, pp. 199-217
-
-
Biskup, J.1
Weibert, T.2
-
26
-
-
48249156214
-
Preprocessing for controlled query evaluation with availability policy
-
Biskup, J. and Wiese, L. (2008) 'Preprocessing for controlled query evaluation with availability policy', Journal of Computer Security, Vol. 16, No. 4, pp.477-494.
-
(2008)
Journal of Computer Security
, vol.16
, Issue.4
, pp. 477-494
-
-
Biskup, J.1
Wiese, L.2
-
27
-
-
70350414506
-
Combining consistency and confidentiality requirements in first-order databases
-
of Lecture Notes in Computer Science, Springer
-
Biskup, J. and Wiese, L. (2009) 'Combining consistency and confidentiality requirements in first-order databases', in 12th International Conference on Information Security, ISC, Vol. 5735 of Lecture Notes in Computer Science, pp.121-134, Springer.
-
(2009)
12th International Conference on Information Security, ISC
, vol.5735
, pp. 121-134
-
-
Biskup, J.1
Wiese, L.2
-
28
-
-
79958038774
-
A sound and complete model-generation procedure for consistent and confidentiality-preserving databases
-
Biskup, J. and Wiese, L. (2011) 'A sound and complete model-generation procedure for consistent and confidentiality-preserving databases', Theoretical Computer Science, Vol. 412, pp.4044-4072.
-
(2011)
Theoretical Computer Science
, vol.412
, pp. 4044-4072
-
-
Biskup, J.1
Wiese, L.2
-
29
-
-
0029324246
-
Foundations of secure deductive databases
-
Bonatti, P.A., Kraus, S. and Subrahmanian, V.S. (1995) 'Foundations of secure deductive databases', IEEE Trans. Knowl. Data Eng., Vol. 7, No. 3, pp.406-422.
-
(1995)
IEEE Trans. Knowl. Data Eng.
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.A.1
Kraus, S.2
Subrahmanian, V.S.3
-
30
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
DOI 10.1109/69.895801
-
Brodsky, A., Farkas, C. and Jajodia, S. (2000) 'Secure databases: constraints, inference channels, and monitoring disclosures', IEEE Trans. Knowl. Data Eng., Vol. 12, No. 6, pp.900-919. (Pubitemid 32130742)
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
31
-
-
0035342199
-
Cover story management
-
DOI 10.1016/S0169-023X(01)00006-4, PII S0169023X01000064
-
Cuppens, F. and Gabillon, A. (2001) 'Cover story management', Data Knowl. Eng., Vol. 37, No. 2, pp.177-201. (Pubitemid 32287853)
-
(2001)
Data and Knowledge Engineering
, vol.37
, Issue.2
, pp. 177-201
-
-
Cuppens, F.1
Gabillon, A.2
-
32
-
-
0032657567
-
Specification and enforcement of classification and inference constraints
-
IEEE
-
Dawson, S., De Capitani di Vimercati, S. and Samarati, P. (1999) 'Specification and enforcement of classification and inference constraints', in IEEE Symposium on Security and Privacy, pp.181-195, IEEE.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 181-195
-
-
Dawson, S.1
De Capitani Divimercati, S.2
Samarati, P.3
-
33
-
-
24644431553
-
Policies, models, and languages for access control
-
Databases in Networked Information Systems - 4th International Workshop, DNIS 2005, Proceedings
-
De Capitani di Vimercati, S., Samarati, P. and Jajodia, S. (2005) 'Policies, models, and languages for access control', in Databases in Networked Information Systems, DNIS, Vol. 3433 of Lecture Notes in Computer Science, pp.225-237, Springer. (Pubitemid 41273881)
-
(2005)
Lecture Notes in Computer Science
, vol.3433
, pp. 225-237
-
-
De Capitani Di Vimercati, S.1
Samarati, P.2
Jajodia, S.3
-
34
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
NSPW, ACM
-
Du, W. and Atallah, M.J. (2001) 'Secure multi-party computation problems and their applications: a review and open problems', in New Security Paradigms Workshop, NSPW, pp.13-22, ACM.
-
(2001)
New Security Paradigms Workshop
, pp. 13-22
-
-
Du, W.1
Atallah, M.J.2
-
35
-
-
57349187196
-
Epistemic privacy
-
PODS, ACM
-
Evfimievski, A.V., Fagin, R. and Woodruff, D.P. (2008) 'Epistemic privacy', in Principles of Database Systems, PODS, pp.171-180, ACM.
-
(2008)
Principles of Database Systems
, pp. 171-180
-
-
Evfimievski, A.V.1
Fagin, R.2
Woodruff, D.P.3
-
36
-
-
12244265258
-
The inference problem: A survey
-
Farkas, C. and Jajodia, S. (2002) 'The inference problem: a survey', SIGKDD Explorations, Vol. 4, No. 2, pp.6-11.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
39
-
-
56349155009
-
Secrecy in multiagent systems
-
Halpern, J.Y. and O'Neill, K.R. (2008) 'Secrecy in multiagent systems', ACM Trans. Inf. Syst. Secur., Vol. 12, No. 1, pp.5.1-5.47.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.1
, pp. 51-547
-
-
Halpern, J.Y.1
O'Neill, K.R.2
-
40
-
-
34247199424
-
An equational logic based approach to the security problem against inference attacks on object-oriented databases
-
DOI 10.1016/j.jcss.2007.01.001, PII S0022000007000025
-
Ishihara, Y., Morita, T., Seki, H. and Ito, M. (2007) 'An equational logic based approach to the security problem against inference attacks on object-oriented databases', J. Comput. Syst. Sci., Vol. 73, No. 5, pp.788-817. (Pubitemid 46627661)
-
(2007)
Journal of Computer and System Sciences
, vol.73
, Issue.5
, pp. 788-817
-
-
Ishihara, Y.1
Morita, T.2
Seki, H.3
Ito, M.4
-
41
-
-
0028755016
-
On the validity of the Bell-La Padula model
-
Lindgreen, E.R. and Herschberg, I.S. (1994) 'On the validity of the Bell-La Padula model', Computers & Security, Vol. 13, No. 4, pp.317-333.
-
(1994)
Computers & Security
, vol.13
, Issue.4
, pp. 317-333
-
-
Lindgreen, E.R.1
Herschberg, I.S.2
-
42
-
-
77951519649
-
-
11g Release 1 (11.1), B28286-06, Oracle Corporation, (accessed on 19 December 2011)
-
Lorentz, D. et al. (2010) Oracle Database SQL Language Reference, 11g Release 1 (11.1), B28286-06, Oracle Corporation, available at http://download.oracle.com/docs/cd/B28359-01/server.111/b 28286/toc.htm (accessed on 19 December 2011).
-
(2010)
Oracle Database SQL Language Reference
-
-
Lorentz, D.1
-
43
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Article 3.1-3.52
-
Machanavajjhala, A., Kifer, D., Gehrke, J. and Venkitasubramaniam, M. (2007) 'l-diversity: privacy beyond k-anonymity', TKDD, Vol. 1, No. 1, Article 3.1-3.52.
-
(2007)
TKDD
, vol.1
, Issue.1
-
-
MacHanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
44
-
-
40149092856
-
-
University of New Mexico,(accessed on 19 December 2011)
-
McCune, W. (2005-2010) Prover9 and Mace4, University of New Mexico, available at http://www.cs.unm.edu/-mccune/prover9/(accessed on 19 December 2011).
-
(2005)
Prover9 and Mace4
-
-
McCune, W.1
-
45
-
-
33845891886
-
A formal analysis of information disclosure in data exchange
-
DOI 10.1016/j.jcss.2006.10.004, PII S0022000006001127, Database Theory 2004
-
Miklau, G. and Suciu, D. (2007) 'A formal analysis of information disclosure in data exchange', J. Comput. Syst. Sci., Vol. 73, No. 3, pp.507-534. (Pubitemid 46027076)
-
(2007)
Journal of Computer and System Sciences
, vol.73
, Issue.3
, pp. 507-534
-
-
Miklau, G.1
Suciu, D.2
-
46
-
-
33748543201
-
Distributed usage control
-
DOI 10.1145/1151030.1151053, Privacy and Security in Highly Dynamic Systems
-
Pretschner, A., Hilty, M. and Basin, D.A. (2006) 'Distributed usage control', Commun. ACM, Vol. 49, No. 9, pp.39-44. (Pubitemid 44371759)
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
47
-
-
57849100172
-
Mechanisms for usage control
-
ACM
-
Pretschner, A., Hilty, M., Basin, D.A., Schaefer, C. and Walter, T. (2008) 'Mechanisms for usage control', in Information, Computer and Communications Security, ASIACCS, pp.240-244, ACM.
-
(2008)
Information, Computer and Communications Security, ASIACCS
, pp. 240-244
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.A.3
Schaefer, C.4
Walter, T.5
-
48
-
-
0020718929
-
Answering queries without revealing secrets
-
DOI 10.1145/319830.319833
-
Sicherman, G.L., de Jonge, W. and van de Riet, R.P. (1983) 'Answering queries without revealing secrets', ACM Trans. Database Syst., Vol. 8, No. 1, pp.41-59. (Pubitemid 13503447)
-
(1983)
ACM Transactions on Database Systems
, vol.8
, Issue.1
, pp. 41-59
-
-
Sicherman, G.L.1
De Jonge, W.2
Van De Riet Reind, P.3
-
49
-
-
84914732721
-
Access control in a relational data base management system by query modification
-
ACM
-
Stonebraker, M. and Wong, E. (1974) 'Access control in a relational data base management system by query modification', in ACM/CSC-ER Annual Conference, pp.180-186, ACM.
-
(1974)
ACM/CSC-ER Annual Conference
, pp. 180-186
-
-
Stonebraker, M.1
Wong, E.2
-
50
-
-
67650486144
-
Data privacy for knowledge bases
-
of Lecture Notes in Computer Science, Springer
-
Stouppa, P. and Studer, T. (2009) 'Data privacy for knowledge bases', in International Symposium on Logical Foundations of Computer Science, LFCS, Vol. 5407 of Lecture Notes in Computer Science, pp.409-421, Springer.
-
(2009)
International Symposium on Logical Foundations of Computer Science, LFCS
, vol.5407
, pp. 409-421
-
-
Stouppa, P.1
Studer, T.2
-
51
-
-
77951525201
-
Using SAT-solvers to compute inference-proof database instances
-
of Lecture Notes in Computer Science, Springer
-
Tadros, C. and Wiese, L. (2010) 'Using SAT-solvers to compute inference-proof database instances', in DPM/SETOP 09, Vol. 5939 of Lecture Notes in Computer Science, pp.65-77, Springer.
-
(2010)
DPM/SETOP 09
, vol.5939
, pp. 65-77
-
-
Tadros, C.1
Wiese, L.2
-
52
-
-
77951141655
-
-
PhD thesis, Technische Universität Dortmund, (accessed on 19 December 2011)
-
Weibert, T. (2008) 'A framework for inference control in incomplete logic databases', PhD thesis, Technische Universität Dortmund, available at http://hdl.handle.net/2003/25116 (accessed on 19 December 2011).
-
(2008)
A Framework for Inference Control in Incomplete Logic Databases
-
-
Weibert, T.1
-
54
-
-
0028720693
-
Formal query languages for secure relational databases
-
Winslett, M., Smith, K. and Qian, X. (1994) 'Formal query languages for secure relational databases', ACM Trans. Database Syst., Vol. 19, No. 4, pp.626-662.
-
(1994)
ACM Trans. Database Syst.
, vol.19
, Issue.4
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
-
55
-
-
77049113795
-
Authorization views and conditional query containment
-
of Lecture Notes in Computer Science, Springer
-
Zhang, Z. and Mendelzon, A.O. (2005) 'Authorization views and conditional query containment', in 10th International Conference on Database Theory, ICDT, Vol. 3363 of Lecture Notes in Computer Science, pp.259-273, Springer.
-
(2005)
10th International Conference on Database Theory, ICDT
, vol.3363
, pp. 259-273
-
-
Zhang, Z.1
Mendelzon, A.O.2
|