메뉴 건너뛰기




Volumn 20, Issue 5, 2012, Pages 463-508

An OBDD approach to enforce confidentiality and visibility constraints in data publishing

Author keywords

confidentiality and visibility constraints; fragmentation; maximum weighted clique; OBDDs; Privacy

Indexed keywords

BINARY DECISION DIAGRAMS; DATA PRIVACY; VISIBILITY;

EID: 84872227035     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2012-0449     Document Type: Article
Times cited : (13)

References (31)
  • 2
    • 38849139678 scopus 로고    scopus 로고
    • Reducing inference control to access control for normalized database schemas
    • DOI 10.1016/j.ipl.2007.09.007, PII S0020019007002712
    • J. Biskup, D.W. Embley and J. Lochner, Reducing inference control to access control for normalized database schemas, Inform. Process. Lett. 106(1) (2008), 8-12. (Pubitemid 351199847)
    • (2008) Information Processing Letters , vol.106 , Issue.1 , pp. 8-12
    • Biskup, J.1    Embley, D.W.2    Lochner, J.-H.3
  • 3
    • 85043086199 scopus 로고    scopus 로고
    • Enforcing confidentiality in relational databases by reducing inference control to access control
    • Valparaíso, Chile, October
    • J. Biskup and J. Lochner, Enforcing confidentiality in relational databases by reducing inference control to access control, in: Proc. of ISC 2007, Valparaíso, Chile, October 2007.
    • (2007) Proc. of ISC 2007
    • Biskup, J.1    Lochner, J.2
  • 4
    • 84872238800 scopus 로고    scopus 로고
    • On the Inference-proofness of Database Fragmentation Satisfying Confidentiality Constraints
    • Xi'an, China, October
    • J. Biskup, M. Preuß and L. Wiese, On the inference-proofness of database fragmentation satisfying confidentiality constraints, in: Proc. of ISC 2011, Xi'an, China, October 2011.
    • (2011) Proc. of ISC 2011
    • Biskup, J.1    Preuß, M.2    Wiese, L.3
  • 5
    • 85043057475 scopus 로고    scopus 로고
    • Combining consistency and confidentiality requirements in first-order databases
    • Pisa, Italy, September
    • J. Biskup and L. Wiese, Combining consistency and confidentiality requirements in first-order databases, in: Proc. of ISC 2009, Pisa, Italy, September 2009.
    • (2009) Proc. of ISC 2009
    • Biskup, J.1    Wiese, L.2
  • 6
    • 79958038774 scopus 로고    scopus 로고
    • A sound and complete model-generation procedure for consistent and confidentiality-preserving databases
    • J. Biskup and L. Wiese, A sound and complete model-generation procedure for consistent and confidentiality-preserving databases, Theoret. Comput. Sci. 412(31) (2011), 4044-4072.
    • (2011) Theoret. Comput. Sci. , vol.412 , Issue.31 , pp. 4044-4072
    • Biskup, J.1    Wiese, L.2
  • 7
    • 0022769976 scopus 로고
    • Graph-based algorithms for Boolean function manipulation
    • R.E. Bryant, Graph-based algorithms for Boolean function manipulation, IEEE TC 35(8) (1986), 677-691.
    • (1986) IEEE TC , vol.35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 8
    • 60649105959 scopus 로고    scopus 로고
    • Privacy-aware biometrics: Design and implementation of a multimodal verification system
    • Anaheim, CA, USA, December
    • S. Cimato, M. Gamassi, V. Piuri, R. Sassi and F. Scotti, Privacy-aware biometrics: design and implementation of a multimodal verification system, in: Proc. of ACSAC 2008, Anaheim, CA, USA, December 2008.
    • (2008) Proc. of ACSAC 2008
    • Cimato, S.1    Gamassi, M.2    Piuri, V.3    Sassi, R.4    Scotti, F.5
  • 17
    • 77955452167 scopus 로고    scopus 로고
    • Fast set bounds propagation using a BDD-SAT hybrid
    • G. Gange, P.J. Stuckey and V. Lagoon, Fast set bounds propagation using a BDD-SAT hybrid, Int. J. Artif. Intell. 38(1) (2010), 307-338.
    • (2010) Int. J. Artif. Intell. , vol.38 , Issue.1 , pp. 307-338
    • Gange, G.1    Stuckey, P.J.2    Lagoon, V.3
  • 18
  • 19
    • 57649168881 scopus 로고    scopus 로고
    • On automata, MDDs and BDDs in constraint satisfaction
    • Patras, Greece, July
    • T. Hadzic, E.R. Hansen and B. O'Sullivan, On automata, MDDs and BDDs in constraint satisfaction, in: Proc. of ECAI 2008, Patras, Greece, July 2008.
    • (2008) Proc. of ECAI 2008
    • Hadzic, T.1    Hansen, E.R.2    O'Sullivan, B.3
  • 21
    • 9444258628 scopus 로고    scopus 로고
    • Efficient BDD encodings for partial order constraints with application to expert systems in software verification
    • Innovations in Applied Artificial Intelligence
    • M. Kurihara and H. Kondo, Efficient BDD encodings for partial order constraints with application to expert systems in software verification, in: Innovations in Applied Artificial Intelligence, B. Orchard, C. Yang and M. Ali, eds, Springer, Berlin, 2004, pp. 827-837. (Pubitemid 38761288)
    • (2004) Lecture Notes In Computer Science , Issue.3029 , pp. 827-837
    • Kurihara, M.1    Kondo, H.2
  • 24
    • 84976839448 scopus 로고
    • Vertical partitioning for database design: A graphical algorithm
    • Portland, OR, USA, June
    • S. Navathe and M. Ra, Vertical partitioning for database design: a graphical algorithm, in: Proc. of SIGMOD 1989, Portland, OR, USA, June 1989.
    • (1989) Proc. of SIGMOD 1989
    • Navathe, S.1    Ra, M.2
  • 25
    • 1342295659 scopus 로고    scopus 로고
    • A New Algorithm for the Maximum-weight Clique Problem
    • P.R.J. Östergård, A new algorithm for the maximum-weight clique problem, Nordic J. Comput. 8(4) (2001), 424-436.
    • (2001) Nordic J. Comput. , vol.8 , Issue.4 , pp. 424-436
    • Östergård, P.R.J.1
  • 26
    • 84867997005 scopus 로고    scopus 로고
    • A Fast Algorithm for the Maximum Clique Problem
    • P.R.J. Östergård, A fast algorithm for the maximum clique problem, Discrete Appl. Math. 120(1-3) (2002), 197-207.
    • (2002) Discrete Appl. Math. , vol.120 , Issue.1-3 , pp. 197-207
    • Östergård, P.R.J.1
  • 27
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • DOI 10.1109/69.971193
    • P. Samarati, Protecting respondents' identities in microdata release, IEEE TKDE 13(6) (2001), 1010-1027. (Pubitemid 34035590)
    • (2001) IEEE Transactions on Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 28
    • 77954461010 scopus 로고    scopus 로고
    • Data Protection in Outsourcing Scenarios: Issues and Directions
    • Beijing, China, April 2010 (Invited paper)
    • P. Samarati and S. De Capitani di Vimercati, Data protection in outsourcing scenarios: issues and directions, in: Proc. of the ASIACCS 2010, Beijing, China, April 2010 (Invited paper).
    • Proc. of the ASIACCS 2010
    • Samarati, P.1    De Vimercati Di Capitani, S.2
  • 30
    • 84872233418 scopus 로고    scopus 로고
    • An Index Structure for Private Data Outsourcing
    • Richmond, VA, USA, July
    • A. Steele and K.B. Frikken, An index structure for private data outsourcing, in: Proc. of DBSec 2011, Richmond, VA, USA, July 2011.
    • (2011) Proc. of DBSec 2011
    • Steele, A.1    Frikken, K.B.2
  • 31
    • 85043060682 scopus 로고    scopus 로고
    • Horizontal Fragmentation for Data Outsourcing with Formula-based Confidentiality Constraints
    • Kobe, Japan, November
    • L. Wiese, Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints, in: Proc. of IWSEC 2010, Kobe, Japan, November 2010.
    • (2010) Proc. of IWSEC 2010
    • Wiese, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.