메뉴 건너뛰기




Volumn 20, Issue 5, 2012, Pages 509-546

Dynamic policy adaptation for inference control of queries to a propositional information system

Author keywords

A priori knowledge; closed query; confidentiality policy; Controlled Query Evaluation; disjunctive form; implication problem; inference control; information system; interaction history; policy adaptation; prime implicant; propositional logic; refusal; SAT solving; theorem proving; view

Indexed keywords

CLOSED QUERY; DISJUNCTIVE FORM; IMPLICATION PROBLEM; INFERENCE CONTROL; INTERACTION HISTORY; POLICY ADAPTATION; PRIME IMPLICANTS; PRIORI KNOWLEDGE; PROPOSITIONAL LOGIC; QUERY EVALUATION; REFUSAL; SAT-SOLVING; VIEW;

EID: 84872247674     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2012-0450     Document Type: Conference Paper
Times cited : (7)

References (41)
  • 2
    • 49049100147 scopus 로고    scopus 로고
    • Secure computer systems: A mathematical model, Vol. II
    • D.E. Bell and L.J. LaPadula, Secure computer systems: a mathematical model, Vol. II, J. Comput. Secur. 4(2, 3) (1996), 229-263.
    • (1996) J. Comput. Secur. , vol.4 , Issue.2-3 , pp. 229-263
    • Bell, D.E.1    Lapadula, L.J.2
  • 3
    • 0033725849 scopus 로고    scopus 로고
    • A Logic-based Approach for Enforcing Access Control
    • E. Bertino, F. Buccafurri, E. Ferrari and P. Rullo, A logic-based approach for enforcing access control, J. Comput. Secur. 8(2, 3) (2000), 109-139.
    • (2000) J. Comput. Secur. , vol.8 , Issue.2-3 , pp. 109-139
    • Bertino, E.1    Buccafurri, F.2    Ferrari, E.3    Rullo, P.4
  • 4
    • 0034174093 scopus 로고    scopus 로고
    • For unknown secrecies refusal is better than lying
    • DOI 10.1016/S0169-023X(99)00043-9
    • J. Biskup, For unknown secrecies refusal is better than lying, Data Knowl. Eng. 33(1) (2000), 1-23. (Pubitemid 30568314)
    • (2000) Data and Knowledge Engineering , vol.33 , Issue.1 , pp. 1-23
    • Biskup, J.1
  • 6
    • 77951549976 scopus 로고    scopus 로고
    • Usability Confinement of Server Reactions Maintaining Inference-proof Client Views by Controlled Interaction Execution
    • S. Kikuchi, S. Sachdeva and S. Bhalla, eds, Lecture Notes in Computer Science Springer, Berlin/Heidelberg
    • J. Biskup, Usability confinement of server reactions maintaining inference-proof client views by controlled interaction execution, in: Databases in Networked Information Systems, S. Kikuchi, S. Sachdeva and S. Bhalla, eds, Lecture Notes in Computer Science, Vol. 5999, Springer, Berlin/Heidelberg, 2010, pp. 80-106.
    • (2010) Databases in Networked Information Systems , vol.5999 , pp. 80-106
    • Biskup, J.1
  • 7
    • 79960204744 scopus 로고    scopus 로고
    • History-dependent Inference Control of Queries by Dynamic Policy Adaption
    • Y. Li, ed Springer, Berlin/Heidelberg
    • J. Biskup, History-dependent inference control of queries by dynamic policy adaption, in: Y. Li, ed., Data and Applications Security and Privacy, Lecture Notes in Computer Science, Vol. 6818, Springer, Berlin/Heidelberg, 2011, pp. 106-121.
    • (2011) Data and Applications Security and Privacy, Lecture Notes in Computer Science , vol.6818 , pp. 106-121
    • Biskup, J.1
  • 8
    • 84872246581 scopus 로고    scopus 로고
    • Inference Control
    • 2nd edn, H.C.A. van Tilborg and S. Jajodia, eds, Springer, Berlin/Heidelberg
    • J. Biskup, Inference control, in: Encyclopedia of Cryptography and Security, 2nd edn, H.C.A. van Tilborg and S. Jajodia, eds, Springer, Berlin/Heidelberg, 2011, pp. 600-605.
    • (2011) Encyclopedia of Cryptography and Security , pp. 600-605
    • Biskup, J.1
  • 9
    • 84859376513 scopus 로고    scopus 로고
    • Inference-usability confinement by maintaining inference-proof views of an information system
    • J. Biskup, Inference-usability confinement by maintaining inference-proof views of an information system, Int. J. Comput. Sci. Eng. 7(1) (2012), 17-37.
    • (2012) Int. J. Comput. Sci. Eng. , vol.7 , Issue.1 , pp. 17-37
    • Biskup, J.1
  • 10
    • 0035425994 scopus 로고    scopus 로고
    • Lying versus refusal for known potential secrets
    • DOI 10.1016/S0169-023X(01)00024-6, PII S0169023X01000246
    • J. Biskup and P.A. Bonatti, Lying versus refusal for known potential secrets, Data Knowl. Eng. 38(2) (2001), 199-222. (Pubitemid 32698732)
    • (2001) Data and Knowledge Engineering , vol.38 , Issue.2 , pp. 199-222
    • Biskup, J.1    Bonatti, P.A.2
  • 11
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • J. Biskup and P.A. Bonatti, Controlled query evaluation for enforcing confidentiality in complete information systems, Int. J. Inf. Sec. 3(1) (2004), 14-27.
    • (2004) Int. J. Inf. Sec. , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 12
    • 34547684253 scopus 로고    scopus 로고
    • Controlled query evaluation with open queries for a decidable relational submodel
    • J. Biskup and P.A. Bonatti, Controlled query evaluation with open queries for a decidable relational submodel, Ann. Math. Artif. Intell. 50(1, 2) (2007), 39-77.
    • (2007) Ann. Math. Artif. Intell. , vol.50 , Issue.1-2 , pp. 39-77
    • Biskup, J.1    Bonatti, P.A.2
  • 13
    • 38849139678 scopus 로고    scopus 로고
    • Reducing inference control to access control for normalized database schemas
    • DOI 10.1016/j.ipl.2007.09.007, PII S0020019007002712
    • J. Biskup, D.W. Embley and J.-H. Lochner, Reducing inference control to access control for normalized database schemas, Inf. Process. Lett. 106(1) (2008), 8-12. (Pubitemid 351199847)
    • (2008) Information Processing Letters , vol.106 , Issue.1 , pp. 8-12
    • Biskup, J.1    Embley, D.W.2    Lochner, J.-H.3
  • 14
    • 79959280117 scopus 로고    scopus 로고
    • Inference-proof View Update Transactions with Forwarded Refreshments
    • J. Biskup, C. Gogolin, J. Seiler and T. Weibert, Inference-proof view update transactions with forwarded refreshments, J. Comput. Secur. 19 (2011), 487-529.
    • (2011) J. Comput. Secur. , vol.19 , pp. 487-529
    • Biskup, J.1    Gogolin, C.2    Seiler, J.3    Weibert, T.4
  • 15
    • 77958513273 scopus 로고    scopus 로고
    • Efficient Inference Control for Open Relational Queries
    • S. Foresti and S. Jajodia, eds, Lecture Notes in Computer Science Springer, Berlin/Heidelberg
    • J. Biskup, S. Hartmann, S. Link and J.-H. Lochner, Efficient inference control for open relational queries, in: Database and Applications Security, S. Foresti and S. Jajodia, eds, Lecture Notes in Computer Science, Vol. 6166, Springer, Berlin/Heidelberg, 2010, pp. 162-176.
    • (2010) Database and Applications Security , vol.6166 , pp. 162-176
    • Biskup, J.1    Hartmann, S.2    Link, S.3    Lochner, J.-H.4
  • 16
    • 74549139700 scopus 로고    scopus 로고
    • Optimistic anonymous participation in inter-organizational workflow instances, in: Information Systems Security
    • A. Bagchi and V. Atluri, eds Springer, Berlin/Heidelberg
    • J. Biskup and J. Parthe, Optimistic anonymous participation in inter-organizational workflow instances, in: Information Systems Security, A. Bagchi and V. Atluri, eds, Lecture Notes in Computer Science, Vol. 4332, Springer, Berlin/Heidelberg, 2006, pp. 86-100.
    • (2006) Lecture Notes in Computer Science , vol.4332 , pp. 86-100
    • Biskup, J.1    Parthe, J.2
  • 17
    • 84903848955 scopus 로고    scopus 로고
    • Inference-proof view update transactions with minimal refusals, in: Data Privacy Management and Autonomous Spontaneous Security
    • J. Garcia-Alfaro, G. Navarro-Arribas, N. Cuppens-Boulahia and S. De Capitani di Vimercati, eds Springer, Berlin/Heidelberg
    • J. Biskup and C. Tadros, Inference-proof view update transactions with minimal refusals, in: Data Privacy Management and Autonomous Spontaneous Security, J. Garcia-Alfaro, G. Navarro-Arribas, N. Cuppens-Boulahia and S. De Capitani di Vimercati, eds, Lecture Notes in Computer Science, Vol. 7122, Springer, Berlin/Heidelberg, 2012, pp. 104-121.
    • (2012) Lecture Notes in Computer Science , vol.7122 , pp. 104-121
    • Biskup, J.1    Tadros, C.2
  • 19
    • 48249156214 scopus 로고    scopus 로고
    • Preprocessing for Controlled Query Evaluation with Availability Policy
    • J. Biskup and L. Wiese, Preprocessing for controlled query evaluation with availability policy, J. Comput. Secur. 16(4) (2008), 477-494.
    • (2008) J. Comput. Secur. , vol.16 , Issue.4 , pp. 477-494
    • Biskup, J.1    Wiese, L.2
  • 20
    • 79958038774 scopus 로고    scopus 로고
    • A sound and complete model-generation procedure for consistent and confidentiality-preserving databases
    • J. Biskup and L. Wiese, A sound and complete model-generation procedure for consistent and confidentiality-preserving databases, Theoret. Comput. Sci. 412 (2011), 4044-4072.
    • (2011) Theoret. Comput. Sci. , vol.412 , pp. 4044-4072
    • Biskup, J.1    Wiese, L.2
  • 21
    • 33846008036 scopus 로고    scopus 로고
    • Propositional Satisfiability and Constraint Programming: A Comparative Survey
    • L. Bordeaux, Y. Hamadi and L. Zhang, Propositional satisfiability and constraint programming: a comparative survey, ACM Comput. Surv. 38(4) (2006), 121-1254.
    • (2006) ACM Comput. Surv. , vol.38 , Issue.4 , pp. 1211-1254
    • Bordeaux, L.1    Hamadi, Y.2    Zhang, L.3
  • 22
    • 46649105922 scopus 로고    scopus 로고
    • Protection of database security via collaborative inference detection
    • Y. Chen and W.W. Chu, Protection of database security via collaborative inference detection, IEEE Trans. Knowl. Data Eng. 20(8) (2008), 1013-1027.
    • (2008) IEEE Trans. Knowl. Data Eng. , vol.20 , Issue.8 , pp. 1013-1027
    • Chen, Y.1    Chu, W.W.2
  • 24
    • 85059770931 scopus 로고
    • The complexity of theorem-proving procedures
    • M.A. Harrison, R.B. Banerji and J.D. Ullman, eds, ACM Press, New York
    • S.A. Cook, The complexity of theorem-proving procedures, in: Proc. Symposium on Theory of Computing, M.A. Harrison, R.B. Banerji and J.D. Ullman, eds, ACM Press, New York, 1971, pp. 151-158.
    • (1971) Proc. Symposium on Theory of Computing , pp. 151-158
    • Cook, S.A.1
  • 25
    • 84919401135 scopus 로고
    • A machine program for theorem-proving
    • M. Davis, G. Logemann and D.W. Loveland, A machine program for theorem-proving, Commun. ACM 5(7) (1962), 394-397.
    • (1962) Commun. ACM , vol.5 , Issue.7 , pp. 394-397
    • Davis, M.1    Logemann, G.2    Loveland, D.W.3
  • 26
    • 84881072062 scopus 로고
    • A computing procedure for quantification theory
    • M. Davis and H. Putnam, A computing procedure for quantification theory, J. ACM 7(3) (1960), 201-215.
    • (1960) J. ACM , vol.7 , Issue.3 , pp. 201-215
    • Davis, M.1    Putnam, H.2
  • 29
    • 12244265258 scopus 로고    scopus 로고
    • The inference problem: A survey
    • C. Farkas and S. Jajodia, The inference problem: a survey, SIGKDD Explorations 4(2) (2002), 6-11.
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 31
    • 79959400343 scopus 로고    scopus 로고
    • Empirical study of the anatomy of modern SAT solvers, in: Theory and Applications of Satisfiability Testing
    • K.A. Sakallah and L. Simon, eds Springer, Berlin/Heidelberg
    • H. Katebi, K.A. Sakallah and J.P. Marques-Silva, Empirical study of the anatomy of modern SAT solvers, in: Theory and Applications of Satisfiability Testing, K.A. Sakallah and L. Simon, eds, Lecture Notes in Computer Science, Vol. 6695, Springer, Berlin/Heidelberg, 2011, pp. 343-356.
    • (2011) Lecture Notes in Computer Science , vol.6695 , pp. 343-356
    • Katebi, H.1    Sakallah, K.A.2    Marques-Silva, J.P.3
  • 32
    • 79959958758 scopus 로고    scopus 로고
    • Efficient auditing for complex SQL queries
    • T.K. Sellis, R.J. Miller, A. Kementsietsidis and Y. Velegrakis, eds, ACM Press, New York
    • R. Kaushik and R. Ramamurthy, Efficient auditing for complex SQL queries, in: Proc. ACM SIG-MOD International Conference on Management of Data, T.K. Sellis, R.J. Miller, A. Kementsietsidis and Y. Velegrakis, eds, ACM Press, New York, 2011, pp. 697-708.
    • (2011) Proc. ACM SIG-MOD International Conference on Management of Data , pp. 697-708
    • Kaushik, R.1    Ramamurthy, R.2
  • 33
    • 1642309744 scopus 로고    scopus 로고
    • Dynamic access control through Petri net workflows
    • IEEE Computer Society, Los Alamitos, CA
    • K. Knorr, Dynamic access control through Petri net workflows, in: Proc. Annual Computer Security Applications Conference, IEEE Computer Society, Los Alamitos, CA, 2000, pp. 159-167.
    • (2000) Proc. Annual Computer Security Applications Conference , pp. 159-167
    • Knorr, K.1
  • 34
    • 78049404569 scopus 로고    scopus 로고
    • A theory of runtime enforcement, with results
    • D. Gritzalis, B. Preneel and M. Theoharidou, eds, Lecture Notes in Computer Science Springer, Berlin/Heidelberg
    • K. Ligatti and S. Reddy, A theory of runtime enforcement, with results, in: Proc. European Symposium on Research in Computer Security, D. Gritzalis, B. Preneel and M. Theoharidou, eds, Lecture Notes in Computer Science, Vol. 6345, Springer, Berlin/Heidelberg, 2010, pp. 87-100.
    • (2010) Proc. European Symposium on Research in Computer Security , vol.6345 , pp. 87-100
    • Ligatti, K.1    Reddy, S.2
  • 35
    • 69149105621 scopus 로고    scopus 로고
    • Boolean satisfiability from theoretical hardness to practical success
    • S. Malik and L. Zhang, Boolean satisfiability from theoretical hardness to practical success, Commun. ACM 52(8) (2009), 76-82.
    • (2009) Commun. ACM , vol.52 , Issue.8 , pp. 76-82
    • Malik, S.1    Zhang, L.2
  • 36
    • 33845891886 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • DOI 10.1016/j.jcss.2006.10.004, PII S0022000006001127, Database Theory 2004
    • G. Miklau and D. Suciu, A formal analysis of information disclosure in data exchange, J. Comput. Syst. Sci. 73(3) (2007), 507-534. (Pubitemid 46027076)
    • (2007) Journal of Computer and System Sciences , vol.73 , Issue.3 , pp. 507-534
    • Miklau, G.1    Suciu, D.2
  • 37
    • 52649162862 scopus 로고    scopus 로고
    • Auditing SQL queries
    • G. Alonso, J.A. Blakeley and A.L.P. Chen, eds, IEEE Computer Society, Los Alamitos, CA
    • R. Motwani, S.U. Nabar and D. Thomas, Auditing SQL queries, in: Proc. International Conference on Data Engineering, G. Alonso, J.A. Blakeley and A.L.P. Chen, eds, IEEE Computer Society, Los Alamitos, CA, 2008, pp. 287-296.
    • (2008) Proc. International Conference on Data Engineering , pp. 287-296
    • Motwani, R.1    Nabar, S.U.2    Thomas, D.3
  • 38
  • 41
    • 77049113795 scopus 로고    scopus 로고
    • Authorization views and conditional query containment, in International Conference on Database Theory
    • T. Eiter and L. Libkin, eds Springer, Berlin/Heidelberg
    • Z. Zhang and A.O. Mendelzon, Authorization views and conditional query containment, in International Conference on Database Theory, T. Eiter and L. Libkin, eds, Lecture Notes in Computer Science, Vol. 3363, Springer, Berlin/Heidelberg, 2005, pp. 259-273.
    • (2005) Lecture Notes in Computer Science , vol.3363 , pp. 259-273
    • Zhang, Z.1    Mendelzon, A.O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.