-
1
-
-
0003928313
-
-
Addison-Wesley, Reading, MA
-
S. Abiteboul, R. Hull and V. Vianu, Foundations of Databases, Addison-Wesley, Reading, MA, 1995.
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
2
-
-
49049100147
-
Secure computer systems: A mathematical model, Vol. II
-
D.E. Bell and L.J. LaPadula, Secure computer systems: a mathematical model, Vol. II, J. Comput. Secur. 4(2, 3) (1996), 229-263.
-
(1996)
J. Comput. Secur.
, vol.4
, Issue.2-3
, pp. 229-263
-
-
Bell, D.E.1
Lapadula, L.J.2
-
3
-
-
0033725849
-
A Logic-based Approach for Enforcing Access Control
-
E. Bertino, F. Buccafurri, E. Ferrari and P. Rullo, A logic-based approach for enforcing access control, J. Comput. Secur. 8(2, 3) (2000), 109-139.
-
(2000)
J. Comput. Secur.
, vol.8
, Issue.2-3
, pp. 109-139
-
-
Bertino, E.1
Buccafurri, F.2
Ferrari, E.3
Rullo, P.4
-
4
-
-
0034174093
-
For unknown secrecies refusal is better than lying
-
DOI 10.1016/S0169-023X(99)00043-9
-
J. Biskup, For unknown secrecies refusal is better than lying, Data Knowl. Eng. 33(1) (2000), 1-23. (Pubitemid 30568314)
-
(2000)
Data and Knowledge Engineering
, vol.33
, Issue.1
, pp. 1-23
-
-
Biskup, J.1
-
6
-
-
77951549976
-
Usability Confinement of Server Reactions Maintaining Inference-proof Client Views by Controlled Interaction Execution
-
S. Kikuchi, S. Sachdeva and S. Bhalla, eds, Lecture Notes in Computer Science Springer, Berlin/Heidelberg
-
J. Biskup, Usability confinement of server reactions maintaining inference-proof client views by controlled interaction execution, in: Databases in Networked Information Systems, S. Kikuchi, S. Sachdeva and S. Bhalla, eds, Lecture Notes in Computer Science, Vol. 5999, Springer, Berlin/Heidelberg, 2010, pp. 80-106.
-
(2010)
Databases in Networked Information Systems
, vol.5999
, pp. 80-106
-
-
Biskup, J.1
-
7
-
-
79960204744
-
History-dependent Inference Control of Queries by Dynamic Policy Adaption
-
Y. Li, ed Springer, Berlin/Heidelberg
-
J. Biskup, History-dependent inference control of queries by dynamic policy adaption, in: Y. Li, ed., Data and Applications Security and Privacy, Lecture Notes in Computer Science, Vol. 6818, Springer, Berlin/Heidelberg, 2011, pp. 106-121.
-
(2011)
Data and Applications Security and Privacy, Lecture Notes in Computer Science
, vol.6818
, pp. 106-121
-
-
Biskup, J.1
-
8
-
-
84872246581
-
Inference Control
-
2nd edn, H.C.A. van Tilborg and S. Jajodia, eds, Springer, Berlin/Heidelberg
-
J. Biskup, Inference control, in: Encyclopedia of Cryptography and Security, 2nd edn, H.C.A. van Tilborg and S. Jajodia, eds, Springer, Berlin/Heidelberg, 2011, pp. 600-605.
-
(2011)
Encyclopedia of Cryptography and Security
, pp. 600-605
-
-
Biskup, J.1
-
9
-
-
84859376513
-
Inference-usability confinement by maintaining inference-proof views of an information system
-
J. Biskup, Inference-usability confinement by maintaining inference-proof views of an information system, Int. J. Comput. Sci. Eng. 7(1) (2012), 17-37.
-
(2012)
Int. J. Comput. Sci. Eng.
, vol.7
, Issue.1
, pp. 17-37
-
-
Biskup, J.1
-
10
-
-
0035425994
-
Lying versus refusal for known potential secrets
-
DOI 10.1016/S0169-023X(01)00024-6, PII S0169023X01000246
-
J. Biskup and P.A. Bonatti, Lying versus refusal for known potential secrets, Data Knowl. Eng. 38(2) (2001), 199-222. (Pubitemid 32698732)
-
(2001)
Data and Knowledge Engineering
, vol.38
, Issue.2
, pp. 199-222
-
-
Biskup, J.1
Bonatti, P.A.2
-
11
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
J. Biskup and P.A. Bonatti, Controlled query evaluation for enforcing confidentiality in complete information systems, Int. J. Inf. Sec. 3(1) (2004), 14-27.
-
(2004)
Int. J. Inf. Sec.
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
12
-
-
34547684253
-
Controlled query evaluation with open queries for a decidable relational submodel
-
J. Biskup and P.A. Bonatti, Controlled query evaluation with open queries for a decidable relational submodel, Ann. Math. Artif. Intell. 50(1, 2) (2007), 39-77.
-
(2007)
Ann. Math. Artif. Intell.
, vol.50
, Issue.1-2
, pp. 39-77
-
-
Biskup, J.1
Bonatti, P.A.2
-
13
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
DOI 10.1016/j.ipl.2007.09.007, PII S0020019007002712
-
J. Biskup, D.W. Embley and J.-H. Lochner, Reducing inference control to access control for normalized database schemas, Inf. Process. Lett. 106(1) (2008), 8-12. (Pubitemid 351199847)
-
(2008)
Information Processing Letters
, vol.106
, Issue.1
, pp. 8-12
-
-
Biskup, J.1
Embley, D.W.2
Lochner, J.-H.3
-
14
-
-
79959280117
-
Inference-proof View Update Transactions with Forwarded Refreshments
-
J. Biskup, C. Gogolin, J. Seiler and T. Weibert, Inference-proof view update transactions with forwarded refreshments, J. Comput. Secur. 19 (2011), 487-529.
-
(2011)
J. Comput. Secur.
, vol.19
, pp. 487-529
-
-
Biskup, J.1
Gogolin, C.2
Seiler, J.3
Weibert, T.4
-
15
-
-
77958513273
-
Efficient Inference Control for Open Relational Queries
-
S. Foresti and S. Jajodia, eds, Lecture Notes in Computer Science Springer, Berlin/Heidelberg
-
J. Biskup, S. Hartmann, S. Link and J.-H. Lochner, Efficient inference control for open relational queries, in: Database and Applications Security, S. Foresti and S. Jajodia, eds, Lecture Notes in Computer Science, Vol. 6166, Springer, Berlin/Heidelberg, 2010, pp. 162-176.
-
(2010)
Database and Applications Security
, vol.6166
, pp. 162-176
-
-
Biskup, J.1
Hartmann, S.2
Link, S.3
Lochner, J.-H.4
-
16
-
-
74549139700
-
Optimistic anonymous participation in inter-organizational workflow instances, in: Information Systems Security
-
A. Bagchi and V. Atluri, eds Springer, Berlin/Heidelberg
-
J. Biskup and J. Parthe, Optimistic anonymous participation in inter-organizational workflow instances, in: Information Systems Security, A. Bagchi and V. Atluri, eds, Lecture Notes in Computer Science, Vol. 4332, Springer, Berlin/Heidelberg, 2006, pp. 86-100.
-
(2006)
Lecture Notes in Computer Science
, vol.4332
, pp. 86-100
-
-
Biskup, J.1
Parthe, J.2
-
17
-
-
84903848955
-
Inference-proof view update transactions with minimal refusals, in: Data Privacy Management and Autonomous Spontaneous Security
-
J. Garcia-Alfaro, G. Navarro-Arribas, N. Cuppens-Boulahia and S. De Capitani di Vimercati, eds Springer, Berlin/Heidelberg
-
J. Biskup and C. Tadros, Inference-proof view update transactions with minimal refusals, in: Data Privacy Management and Autonomous Spontaneous Security, J. Garcia-Alfaro, G. Navarro-Arribas, N. Cuppens-Boulahia and S. De Capitani di Vimercati, eds, Lecture Notes in Computer Science, Vol. 7122, Springer, Berlin/Heidelberg, 2012, pp. 104-121.
-
(2012)
Lecture Notes in Computer Science
, vol.7122
, pp. 104-121
-
-
Biskup, J.1
Tadros, C.2
-
19
-
-
48249156214
-
Preprocessing for Controlled Query Evaluation with Availability Policy
-
J. Biskup and L. Wiese, Preprocessing for controlled query evaluation with availability policy, J. Comput. Secur. 16(4) (2008), 477-494.
-
(2008)
J. Comput. Secur.
, vol.16
, Issue.4
, pp. 477-494
-
-
Biskup, J.1
Wiese, L.2
-
20
-
-
79958038774
-
A sound and complete model-generation procedure for consistent and confidentiality-preserving databases
-
J. Biskup and L. Wiese, A sound and complete model-generation procedure for consistent and confidentiality-preserving databases, Theoret. Comput. Sci. 412 (2011), 4044-4072.
-
(2011)
Theoret. Comput. Sci.
, vol.412
, pp. 4044-4072
-
-
Biskup, J.1
Wiese, L.2
-
21
-
-
33846008036
-
Propositional Satisfiability and Constraint Programming: A Comparative Survey
-
L. Bordeaux, Y. Hamadi and L. Zhang, Propositional satisfiability and constraint programming: a comparative survey, ACM Comput. Surv. 38(4) (2006), 121-1254.
-
(2006)
ACM Comput. Surv.
, vol.38
, Issue.4
, pp. 1211-1254
-
-
Bordeaux, L.1
Hamadi, Y.2
Zhang, L.3
-
22
-
-
46649105922
-
Protection of database security via collaborative inference detection
-
Y. Chen and W.W. Chu, Protection of database security via collaborative inference detection, IEEE Trans. Knowl. Data Eng. 20(8) (2008), 1013-1027.
-
(2008)
IEEE Trans. Knowl. Data Eng.
, vol.20
, Issue.8
, pp. 1013-1027
-
-
Chen, Y.1
Chu, W.W.2
-
24
-
-
85059770931
-
The complexity of theorem-proving procedures
-
M.A. Harrison, R.B. Banerji and J.D. Ullman, eds, ACM Press, New York
-
S.A. Cook, The complexity of theorem-proving procedures, in: Proc. Symposium on Theory of Computing, M.A. Harrison, R.B. Banerji and J.D. Ullman, eds, ACM Press, New York, 1971, pp. 151-158.
-
(1971)
Proc. Symposium on Theory of Computing
, pp. 151-158
-
-
Cook, S.A.1
-
25
-
-
84919401135
-
A machine program for theorem-proving
-
M. Davis, G. Logemann and D.W. Loveland, A machine program for theorem-proving, Commun. ACM 5(7) (1962), 394-397.
-
(1962)
Commun. ACM
, vol.5
, Issue.7
, pp. 394-397
-
-
Davis, M.1
Logemann, G.2
Loveland, D.W.3
-
26
-
-
84881072062
-
A computing procedure for quantification theory
-
M. Davis and H. Putnam, A computing procedure for quantification theory, J. ACM 7(3) (1960), 201-215.
-
(1960)
J. ACM
, vol.7
, Issue.3
, pp. 201-215
-
-
Davis, M.1
Putnam, H.2
-
29
-
-
12244265258
-
The inference problem: A survey
-
C. Farkas and S. Jajodia, The inference problem: a survey, SIGKDD Explorations 4(2) (2002), 6-11.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
30
-
-
0001619596
-
Flexible Support for Multiple Access Control Policies
-
DOI 10.1145/383891.383894
-
S. Jajodia, P. Samarati, M.L. Sapino and V.S. Subrahmanian, Flexible support for multiple access control policies, ACM Trans. Database Syst. 26(2) (2001), 214-260. (Pubitemid 33661632)
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
31
-
-
79959400343
-
Empirical study of the anatomy of modern SAT solvers, in: Theory and Applications of Satisfiability Testing
-
K.A. Sakallah and L. Simon, eds Springer, Berlin/Heidelberg
-
H. Katebi, K.A. Sakallah and J.P. Marques-Silva, Empirical study of the anatomy of modern SAT solvers, in: Theory and Applications of Satisfiability Testing, K.A. Sakallah and L. Simon, eds, Lecture Notes in Computer Science, Vol. 6695, Springer, Berlin/Heidelberg, 2011, pp. 343-356.
-
(2011)
Lecture Notes in Computer Science
, vol.6695
, pp. 343-356
-
-
Katebi, H.1
Sakallah, K.A.2
Marques-Silva, J.P.3
-
32
-
-
79959958758
-
Efficient auditing for complex SQL queries
-
T.K. Sellis, R.J. Miller, A. Kementsietsidis and Y. Velegrakis, eds, ACM Press, New York
-
R. Kaushik and R. Ramamurthy, Efficient auditing for complex SQL queries, in: Proc. ACM SIG-MOD International Conference on Management of Data, T.K. Sellis, R.J. Miller, A. Kementsietsidis and Y. Velegrakis, eds, ACM Press, New York, 2011, pp. 697-708.
-
(2011)
Proc. ACM SIG-MOD International Conference on Management of Data
, pp. 697-708
-
-
Kaushik, R.1
Ramamurthy, R.2
-
33
-
-
1642309744
-
Dynamic access control through Petri net workflows
-
IEEE Computer Society, Los Alamitos, CA
-
K. Knorr, Dynamic access control through Petri net workflows, in: Proc. Annual Computer Security Applications Conference, IEEE Computer Society, Los Alamitos, CA, 2000, pp. 159-167.
-
(2000)
Proc. Annual Computer Security Applications Conference
, pp. 159-167
-
-
Knorr, K.1
-
34
-
-
78049404569
-
A theory of runtime enforcement, with results
-
D. Gritzalis, B. Preneel and M. Theoharidou, eds, Lecture Notes in Computer Science Springer, Berlin/Heidelberg
-
K. Ligatti and S. Reddy, A theory of runtime enforcement, with results, in: Proc. European Symposium on Research in Computer Security, D. Gritzalis, B. Preneel and M. Theoharidou, eds, Lecture Notes in Computer Science, Vol. 6345, Springer, Berlin/Heidelberg, 2010, pp. 87-100.
-
(2010)
Proc. European Symposium on Research in Computer Security
, vol.6345
, pp. 87-100
-
-
Ligatti, K.1
Reddy, S.2
-
35
-
-
69149105621
-
Boolean satisfiability from theoretical hardness to practical success
-
S. Malik and L. Zhang, Boolean satisfiability from theoretical hardness to practical success, Commun. ACM 52(8) (2009), 76-82.
-
(2009)
Commun. ACM
, vol.52
, Issue.8
, pp. 76-82
-
-
Malik, S.1
Zhang, L.2
-
36
-
-
33845891886
-
A formal analysis of information disclosure in data exchange
-
DOI 10.1016/j.jcss.2006.10.004, PII S0022000006001127, Database Theory 2004
-
G. Miklau and D. Suciu, A formal analysis of information disclosure in data exchange, J. Comput. Syst. Sci. 73(3) (2007), 507-534. (Pubitemid 46027076)
-
(2007)
Journal of Computer and System Sciences
, vol.73
, Issue.3
, pp. 507-534
-
-
Miklau, G.1
Suciu, D.2
-
37
-
-
52649162862
-
Auditing SQL queries
-
G. Alonso, J.A. Blakeley and A.L.P. Chen, eds, IEEE Computer Society, Los Alamitos, CA
-
R. Motwani, S.U. Nabar and D. Thomas, Auditing SQL queries, in: Proc. International Conference on Data Engineering, G. Alonso, J.A. Blakeley and A.L.P. Chen, eds, IEEE Computer Society, Los Alamitos, CA, 2008, pp. 287-296.
-
(2008)
Proc. International Conference on Data Engineering
, pp. 287-296
-
-
Motwani, R.1
Nabar, S.U.2
Thomas, D.3
-
38
-
-
84881225236
-
Enforceable security policies
-
F.B. Schneider, Enforceable security policies, ACM Trans. Inf. Syst. Secur. 3(1) (2000), 30-50.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
41
-
-
77049113795
-
Authorization views and conditional query containment, in International Conference on Database Theory
-
T. Eiter and L. Libkin, eds Springer, Berlin/Heidelberg
-
Z. Zhang and A.O. Mendelzon, Authorization views and conditional query containment, in International Conference on Database Theory, T. Eiter and L. Libkin, eds, Lecture Notes in Computer Science, Vol. 3363, Springer, Berlin/Heidelberg, 2005, pp. 259-273.
-
(2005)
Lecture Notes in Computer Science
, vol.3363
, pp. 259-273
-
-
Zhang, Z.1
Mendelzon, A.O.2
|