메뉴 건너뛰기




Volumn 7, Issue 1, 2012, Pages 17-37

Inference-usability confinement by maintaining inference-proof views of an information system

Author keywords

Combined approach; Confidentiality policy; Control mechanism; Indistinguishability property; Inference proof view; Inference usability confinement; Information system; Interaction history; Lying approach; Refusal approach

Indexed keywords

ACCESS CONTROL; INFORMATION SYSTEMS; INFORMATION USE;

EID: 84859376513     PISSN: 17427185     EISSN: 17427193     Source Type: Journal    
DOI: 10.1504/IJCSE.2012.046178     Document Type: Article
Times cited : (20)

References (55)
  • 1
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in work flow management systems
    • Bertino, E., Ferrari, E. and Atluri, V. (1999) 'The specification and enforcement of authorization constraints in work flow management systems', ACM Trans. Inf. Syst. Secur., Vol. 2, No. 1, pp.65-104.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 2
    • 1142309815 scopus 로고    scopus 로고
    • Provisions and obligations in policy management and security applications', in Very Large Data Bases
    • Morgan Kaufmann
    • Bettini, C., Jajodia, S., Wang, X.S. and Wijesekera, D. (2002) 'Provisions and obligations in policy management and security applications', in Very Large Data Bases, VLDB, pp.502-513, Morgan Kaufmann.
    • (2002) VLDB , pp. 502-513
    • Bettini, C.1    Jajodia, S.2    Wang, X.S.3    Wijesekera, D.4
  • 3
    • 0034174093 scopus 로고    scopus 로고
    • For unknown secrecies refusal is better than lying
    • DOI 10.1016/S0169-023X(99)00043-9
    • Biskup, J. (2000) 'For unknown secrecies refusal is better than lying', Data Knowl. Eng., Vol. 33, No. 1, pp.1-23. (Pubitemid 30568314)
    • (2000) Data and Knowledge Engineering , vol.33 , Issue.1 , pp. 1-23
    • Biskup, J.1
  • 5
    • 77951549976 scopus 로고    scopus 로고
    • Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction executions
    • of Lecture Notes in Computer Science, Springer
    • Biskup, J. (2010) 'Usability confinement of server reactions: maintaining inference-proof client views by controlled interaction executions', in 6th International Workshop Databases in Networked Information Systems, DNIS, Vol. 5999 of Lecture Notes in Computer Science, pp.80-106, Springer.
    • (2010) 6th International Workshop Databases in Networked Information Systems, DNIS , vol.5999 , pp. 80-106
    • Biskup, J.1
  • 6
    • 79960204744 scopus 로고    scopus 로고
    • History-dependent inference control of queries by dynamic policy adaption
    • of Lecture Notes in Computer Science, IFIP/Springer
    • Biskup, J. (2011) 'History-dependent inference control of queries by dynamic policy adaption', in 25th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, DBSec, Vol. 6818 of Lecture Notes in Computer Science, pp.108-123, IFIP/Springer.
    • (2011) 25th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, DBSec , vol.6818 , pp. 108-123
    • Biskup, J.1
  • 7
    • 0035425994 scopus 로고    scopus 로고
    • Lying versus refusal for known potential secrets
    • DOI 10.1016/S0169-023X(01)00024-6, PII S0169023X01000246
    • Biskup, J. and Bonatti, P.A. (2001) 'Lying versus refusal for known potential secrets', Data Knowl. Eng., Vol. 38, No. 2, pp.199-222. (Pubitemid 32698732)
    • (2001) Data and Knowledge Engineering , vol.38 , Issue.2 , pp. 199-222
    • Biskup, J.1    Bonatti, P.A.2
  • 8
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • Biskup, J. and Bonatti, P.A. (2004a) 'Controlled query evaluation for enforcing confidentiality in complete information systems', Int. J. Inf. Sec., Vol. 3, No. 1, pp.14-27.
    • (2004) Int. J. Inf. Sec. , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 9
    • 0347756656 scopus 로고    scopus 로고
    • Controlled query evaluation for known policies by combining lying and refusal
    • DOI 10.1023/A:1026106029043
    • Biskup, J. and Bonatti, P.A. (2004b) 'Controlled query evaluation for known policies by combining lying and refusal', Ann. Math. Artif. Intell., Vol. 40, Nos. 1-2, pp.37-62. (Pubitemid 38103547)
    • (2004) Annals of Mathematics and Artificial Intelligence , vol.40 , Issue.1-2 , pp. 37-62
    • Biskup, J.1    Bonatti, P.A.2
  • 10
    • 34547684253 scopus 로고    scopus 로고
    • Controlled query evaluation with open queries for a decidable relational submodel
    • Biskup, J. and Bonatti, P.A. (2007) 'Controlled query evaluation with open queries for a decidable relational submodel', Ann. Math. Artif. Intell., Vol. 50, Nos. 1-2, pp.39-77.
    • (2007) Ann. Math. Artif. Intell. , vol.50 , Issue.1-2 , pp. 39-77
    • Biskup, J.1    Bonatti, P.A.2
  • 12
    • 38849139678 scopus 로고    scopus 로고
    • Reducing inference control to access control for normalized database schemas
    • DOI 10.1016/j.ipl.2007.09.007, PII S0020019007002712
    • Biskup, J., Embley, D.W. and Lochner, J-H. (2008) 'Reducing inference control to access control for normalized database schemas', Inf. Process. Lett., Vol. 106, No. 1, pp.8-12. (Pubitemid 351199847)
    • (2008) Information Processing Letters , vol.106 , Issue.1 , pp. 8-12
    • Biskup, J.1    Embley, D.W.2    Lochner, J.-H.3
  • 13
    • 70350400871 scopus 로고    scopus 로고
    • Requirements and protocols for inference-proof interactions in information systems
    • of Lecture Notes in Computer Science Springer
    • Biskup, J., Gogolin, C., Seiler, J. and Weibert, T. (2009a) 'Requirements and protocols for inference-proof interactions in information systems', in 14th European Symposium on Research in Computer Security, ESORICS, Vol. 5789 of Lecture Notes in Computer Science, pp.285-302, Springer.
    • (2009) 14th European Symposium on Research in Computer Security, ESORICS , vol.5789 , pp. 285-302
    • Biskup, J.1    Gogolin, C.2    Seiler, J.3    Weibert, T.4
  • 15
    • 70350389154 scopus 로고    scopus 로고
    • Controlled query evaluation and inference-free view updates
    • of Lecture Notes in Computer Science Springer
    • Biskup, J., Seiler, J. and Weibert, T. (2009c) 'Controlled query evaluation and inference-free view updates', in Data and Applications Security XXIII, DBSec, Vol. 5645 of Lecture Notes in Computer Science, pp.1-16, Springer.
    • (2009) Data and Applications Security XXIII, DBSec , vol.5645 , pp. 1-16
    • Biskup, J.1    Seiler, J.2    Weibert, T.3
  • 18
    • 38149019240 scopus 로고    scopus 로고
    • Enforcing confidentiality in relational databases by reducing inference control to access control
    • of Lecture Notes in Computer Science Springer
    • Biskup, J. and Lochner, J-H. (2007) 'Enforcing confidentiality in relational databases by reducing inference control to access control', in 10th International Conference on Information Security, ISC, Vol. 4779 of Lecture Notes in Computer Science, pp.407-422, Springer.
    • (2007) 10th International Conference on Information Security, ISC , vol.4779 , pp. 407-422
    • Biskup, J.1    Lochner, J.-H.2
  • 19
    • 79959280117 scopus 로고    scopus 로고
    • Inference-proof view update transactions with forwarded refreshments
    • Biskup, J., Gogolin, C., Seiler, J. and Weibert, T. (2011a) 'Inference-proof view update transactions with forwarded refreshments', Journal of Computer Security, Vol. 19, pp.487-529.
    • (2011) Journal of Computer Security , vol.19 , pp. 487-529
    • Biskup, J.1    Gogolin, C.2    Seiler, J.3    Weibert, T.4
  • 20
    • 80054794829 scopus 로고    scopus 로고
    • On the inferenceproofness of database fragmentation satisfying confidentiality constraints
    • Lai, X., Zhou, J. and Li, H. (Eds.): of Lecture Notes in Computer Science, Springer
    • Biskup, J., Preuss, M. and Wiese, L. (2011b) 'On the inferenceproofness of database fragmentation satisfying confidentiality constraints', in Lai, X., Zhou, J. and Li, H. (Eds.): Information Security, ISC 2011, Vol. 7001 of Lecture Notes in Computer Science, pp.246-261, Springer.
    • (2011) Information Security, ISC 2011 , vol.7001 , pp. 246-261
    • Biskup, J.1    Preuss, M.2    Wiese, L.3
  • 21
    • 84859397510 scopus 로고    scopus 로고
    • Policy-based secrecy in the Runs & Systems Framework and controlled query evaluation
    • IWSEC, Information Processing Society of Japan
    • Biskup, J. and Tadros, C. (2010) 'Policy-based secrecy in the Runs & Systems Framework and controlled query evaluation', in 5th International Workshop on Security (short papers), IWSEC, pp.60-77, Information Processing Society of Japan.
    • (2010) 5th International Workshop on Security (Short Papers) , pp. 60-77
    • Biskup, J.1    Tadros, C.2
  • 22
    • 84903848955 scopus 로고    scopus 로고
    • Inference-proof view update transactions with minimal refusals
    • Garcia-Alfaro J. and Navarro-Arribas G. Cuppens-Boulahia N. and De Capitani di Vimercati S. (Eds.):, to appear of Lecture Notes in Computer Science, Springer
    • Biskup, J. and Tadros, C. (2011) 'Inference-proof view update transactions with minimal refusals', in Garcia-Alfaro, J. and Navarro-Arribas, G., Cuppens-Boulahia, N. and De Capitani di Vimercati, S. (Eds.): DPM 2011/SETOP 2011, to appear, Vol. 7122 of Lecture Notes in Computer Science, Springer.
    • (2011) DPM 2011/SETOP 2011 , vol.7122
    • Biskup, J.1    Tadros, C.2
  • 24
    • 37849036071 scopus 로고    scopus 로고
    • Confidentiality policies for controlled query evaluation
    • of Lecture Notes in Computer Science Springer
    • Biskup, J. and Weibert, T. (2007) 'Confidentiality policies for controlled query evaluation', in Data and Applications Security XXI, DBSec, Vol. 4602 of Lecture Notes in Computer Science, pp.1-13, Springer.
    • (2007) Data and Applications Security XXI, DBSec , vol.4602 , pp. 1-13
    • Biskup, J.1    Weibert, T.2
  • 25
  • 26
    • 48249156214 scopus 로고    scopus 로고
    • Preprocessing for controlled query evaluation with availability policy
    • Biskup, J. and Wiese, L. (2008) 'Preprocessing for controlled query evaluation with availability policy', Journal of Computer Security, Vol. 16, No. 4, pp.477-494.
    • (2008) Journal of Computer Security , vol.16 , Issue.4 , pp. 477-494
    • Biskup, J.1    Wiese, L.2
  • 27
    • 70350414506 scopus 로고    scopus 로고
    • Combining consistency and confidentiality requirements in first-order databases
    • of Lecture Notes in Computer Science, Springer
    • Biskup, J. and Wiese, L. (2009) 'Combining consistency and confidentiality requirements in first-order databases', in 12th International Conference on Information Security, ISC, Vol. 5735 of Lecture Notes in Computer Science, pp.121-134, Springer.
    • (2009) 12th International Conference on Information Security, ISC , vol.5735 , pp. 121-134
    • Biskup, J.1    Wiese, L.2
  • 28
    • 79958038774 scopus 로고    scopus 로고
    • A sound and complete model-generation procedure for consistent and confidentiality-preserving databases
    • Biskup, J. and Wiese, L. (2011) 'A sound and complete model-generation procedure for consistent and confidentiality-preserving databases', Theoretical Computer Science, Vol. 412, pp.4044-4072.
    • (2011) Theoretical Computer Science , vol.412 , pp. 4044-4072
    • Biskup, J.1    Wiese, L.2
  • 30
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosures
    • DOI 10.1109/69.895801
    • Brodsky, A., Farkas, C. and Jajodia, S. (2000) 'Secure databases: constraints, inference channels, and monitoring disclosures', IEEE Trans. Knowl. Data Eng., Vol. 12, No. 6, pp.900-919. (Pubitemid 32130742)
    • (2000) IEEE Transactions on Knowledge and Data Engineering , vol.12 , Issue.6 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 31
    • 0035342199 scopus 로고    scopus 로고
    • Cover story management
    • DOI 10.1016/S0169-023X(01)00006-4, PII S0169023X01000064
    • Cuppens, F. and Gabillon, A. (2001) 'Cover story management', Data Knowl. Eng., Vol. 37, No. 2, pp.177-201. (Pubitemid 32287853)
    • (2001) Data and Knowledge Engineering , vol.37 , Issue.2 , pp. 177-201
    • Cuppens, F.1    Gabillon, A.2
  • 33
    • 24644431553 scopus 로고    scopus 로고
    • Policies, models, and languages for access control
    • Databases in Networked Information Systems - 4th International Workshop, DNIS 2005, Proceedings
    • De Capitani di Vimercati, S., Samarati, P. and Jajodia, S. (2005) 'Policies, models, and languages for access control', in Databases in Networked Information Systems, DNIS, Vol. 3433 of Lecture Notes in Computer Science, pp.225-237, Springer. (Pubitemid 41273881)
    • (2005) Lecture Notes in Computer Science , vol.3433 , pp. 225-237
    • De Capitani Di Vimercati, S.1    Samarati, P.2    Jajodia, S.3
  • 34
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • NSPW, ACM
    • Du, W. and Atallah, M.J. (2001) 'Secure multi-party computation problems and their applications: a review and open problems', in New Security Paradigms Workshop, NSPW, pp.13-22, ACM.
    • (2001) New Security Paradigms Workshop , pp. 13-22
    • Du, W.1    Atallah, M.J.2
  • 36
    • 12244265258 scopus 로고    scopus 로고
    • The inference problem: A survey
    • Farkas, C. and Jajodia, S. (2002) 'The inference problem: a survey', SIGKDD Explorations, Vol. 4, No. 2, pp.6-11.
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 40
    • 34247199424 scopus 로고    scopus 로고
    • An equational logic based approach to the security problem against inference attacks on object-oriented databases
    • DOI 10.1016/j.jcss.2007.01.001, PII S0022000007000025
    • Ishihara, Y., Morita, T., Seki, H. and Ito, M. (2007) 'An equational logic based approach to the security problem against inference attacks on object-oriented databases', J. Comput. Syst. Sci., Vol. 73, No. 5, pp.788-817. (Pubitemid 46627661)
    • (2007) Journal of Computer and System Sciences , vol.73 , Issue.5 , pp. 788-817
    • Ishihara, Y.1    Morita, T.2    Seki, H.3    Ito, M.4
  • 41
    • 0028755016 scopus 로고
    • On the validity of the Bell-La Padula model
    • Lindgreen, E.R. and Herschberg, I.S. (1994) 'On the validity of the Bell-La Padula model', Computers & Security, Vol. 13, No. 4, pp.317-333.
    • (1994) Computers & Security , vol.13 , Issue.4 , pp. 317-333
    • Lindgreen, E.R.1    Herschberg, I.S.2
  • 42
    • 77951519649 scopus 로고    scopus 로고
    • 11g Release 1 (11.1), B28286-06, Oracle Corporation, (accessed on 19 December 2011)
    • Lorentz, D. et al. (2010) Oracle Database SQL Language Reference, 11g Release 1 (11.1), B28286-06, Oracle Corporation, available at http://download.oracle.com/docs/cd/B28359-01/server.111/b 28286/toc.htm (accessed on 19 December 2011).
    • (2010) Oracle Database SQL Language Reference
    • Lorentz, D.1
  • 43
  • 44
    • 40149092856 scopus 로고    scopus 로고
    • University of New Mexico,(accessed on 19 December 2011)
    • McCune, W. (2005-2010) Prover9 and Mace4, University of New Mexico, available at http://www.cs.unm.edu/-mccune/prover9/(accessed on 19 December 2011).
    • (2005) Prover9 and Mace4
    • McCune, W.1
  • 45
    • 33845891886 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • DOI 10.1016/j.jcss.2006.10.004, PII S0022000006001127, Database Theory 2004
    • Miklau, G. and Suciu, D. (2007) 'A formal analysis of information disclosure in data exchange', J. Comput. Syst. Sci., Vol. 73, No. 3, pp.507-534. (Pubitemid 46027076)
    • (2007) Journal of Computer and System Sciences , vol.73 , Issue.3 , pp. 507-534
    • Miklau, G.1    Suciu, D.2
  • 46
    • 33748543201 scopus 로고    scopus 로고
    • Distributed usage control
    • DOI 10.1145/1151030.1151053, Privacy and Security in Highly Dynamic Systems
    • Pretschner, A., Hilty, M. and Basin, D.A. (2006) 'Distributed usage control', Commun. ACM, Vol. 49, No. 9, pp.39-44. (Pubitemid 44371759)
    • (2006) Communications of the ACM , vol.49 , Issue.9 , pp. 39-44
    • Pretschner, A.1    Hilty, M.2    Basin, D.3
  • 49
    • 84914732721 scopus 로고
    • Access control in a relational data base management system by query modification
    • ACM
    • Stonebraker, M. and Wong, E. (1974) 'Access control in a relational data base management system by query modification', in ACM/CSC-ER Annual Conference, pp.180-186, ACM.
    • (1974) ACM/CSC-ER Annual Conference , pp. 180-186
    • Stonebraker, M.1    Wong, E.2
  • 51
    • 77951525201 scopus 로고    scopus 로고
    • Using SAT-solvers to compute inference-proof database instances
    • of Lecture Notes in Computer Science, Springer
    • Tadros, C. and Wiese, L. (2010) 'Using SAT-solvers to compute inference-proof database instances', in DPM/SETOP 09, Vol. 5939 of Lecture Notes in Computer Science, pp.65-77, Springer.
    • (2010) DPM/SETOP 09 , vol.5939 , pp. 65-77
    • Tadros, C.1    Wiese, L.2
  • 52
    • 77951141655 scopus 로고    scopus 로고
    • PhD thesis, Technische Universität Dortmund, (accessed on 19 December 2011)
    • Weibert, T. (2008) 'A framework for inference control in incomplete logic databases', PhD thesis, Technische Universität Dortmund, available at http://hdl.handle.net/2003/25116 (accessed on 19 December 2011).
    • (2008) A Framework for Inference Control in Incomplete Logic Databases
    • Weibert, T.1
  • 54
    • 0028720693 scopus 로고
    • Formal query languages for secure relational databases
    • Winslett, M., Smith, K. and Qian, X. (1994) 'Formal query languages for secure relational databases', ACM Trans. Database Syst., Vol. 19, No. 4, pp.626-662.
    • (1994) ACM Trans. Database Syst. , vol.19 , Issue.4 , pp. 626-662
    • Winslett, M.1    Smith, K.2    Qian, X.3
  • 55
    • 77049113795 scopus 로고    scopus 로고
    • Authorization views and conditional query containment
    • of Lecture Notes in Computer Science, Springer
    • Zhang, Z. and Mendelzon, A.O. (2005) 'Authorization views and conditional query containment', in 10th International Conference on Database Theory, ICDT, Vol. 3363 of Lecture Notes in Computer Science, pp.259-273, Springer.
    • (2005) 10th International Conference on Database Theory, ICDT , vol.3363 , pp. 259-273
    • Zhang, Z.1    Mendelzon, A.O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.