메뉴 건너뛰기




Volumn , Issue , 2013, Pages 43-56

IFDB: Decentralized information flow control for databases

Author keywords

DIFC; information flow control

Indexed keywords

APPLICATION ENVIRONMENT; CONFIDENTIAL INFORMATION; DECENTRALIZED INFORMATION FLOW CONTROL; DIFC; INFORMATION FLOW CONTROL; INFORMATION FLOWS; INTEGRITY CONSTRAINTS; RELATIONAL DATABASE;

EID: 84877710608     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2465351.2465357     Document Type: Conference Paper
Times cited : (57)

References (36)
  • 4
    • 84877718980 scopus 로고    scopus 로고
    • New Facebook photo hacks
    • University of Cambridge Computer Laboratory, May 20
    • J. Bonneau. New Facebook photo hacks. In Light Blue Touchpaper. University of Cambridge Computer Laboratory, May 20, 2009. http://www. lightbluetouchpaper.org/2009/02/11/new-facebook-photo-hacks/.
    • (2009) Light Blue Touchpaper
    • Bonneau, J.1
  • 5
    • 84861595370 scopus 로고    scopus 로고
    • Publishing set-valued data via differential privacy
    • Aug.
    • R. Chen, N. Mohammed, B. Fung, B. Desai, and L. Xiong. Publishing set-valued data via differential privacy. Proc. VLDB, 4(11), Aug. 2011.
    • (2011) Proc. VLDB , vol.4 , Issue.11
    • Chen, R.1    Mohammed, N.2    Fung, B.3    Desai, B.4    Xiong, L.5
  • 7
    • 84857175091 scopus 로고    scopus 로고
    • Static checking of dynamically-varying security policies in database-backed applications
    • A. Chlipala. Static checking of dynamically-varying security policies in database-backed applications. In Proc. OSDI, Oct. 2010.
    • Proc. OSDI, Oct. 2010
    • Chlipala, A.1
  • 9
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. Denning. A lattice model of secure information flow. Commun. ACM, 19, May 1976.
    • (1976) Commun. ACM , pp. 19
    • Denning, D.1
  • 12
    • 85084164495 scopus 로고    scopus 로고
    • The ND2DB attack: Database content extraction using timing attacks on the indexing algorithms
    • USENIX Association
    • A. Futoransky, D. Saura, and A. Waissbein. The ND2DB attack: Database content extraction using timing attacks on the indexing algorithms. In WOOT, Boston, MA, Aug. 2007. USENIX Association.
    • WOOT, Boston, MA, Aug. 2007
    • Futoransky, A.1    Saura, D.2    Waissbein, A.3
  • 13
    • 78650518102 scopus 로고    scopus 로고
    • Boosting the accuracy of differentially private histograms through consistency
    • Sept.
    • M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB, 3(1-2), Sept. 2010.
    • (2010) Proc. VLDB , vol.3 , Issue.1-2
    • Hay, M.1    Rastogi, V.2    Miklau, G.3    Suciu, D.4
  • 16
    • 0026158295 scopus 로고
    • Storage channels in disk arm optimization
    • IEEE, May
    • P. Karger and J. Wray. Storage channels in disk arm optimization. In Proc. Security and Privacy. IEEE, May 1991.
    • (1991) Proc. Security and Privacy
    • Karger, P.1    Wray, J.2
  • 19
    • 28144453801 scopus 로고    scopus 로고
    • Practical information-flow control in web-based information systems
    • IEEE
    • P. Li and S. Zdancewic. Practical information-flow control in web-based information systems. In Proc. CSFW. IEEE, 2005.
    • (2005) Proc. CSFW
    • Li, P.1    Zdancewic, S.2
  • 23
    • 84877712762 scopus 로고    scopus 로고
    • Security glitch exposes WellPoint customers' financial, medical data
    • June 29
    • T. Murphy. Security glitch exposes WellPoint customers' financial, medical data. USA Today, June 29, 2010. URL http://www.usatoday.com/money/ industries/health/2010-06-29-wellpoint-data-breach-N.htm.
    • (2010) USA Today
    • Murphy, T.1
  • 24
  • 26
    • 84877702221 scopus 로고    scopus 로고
    • Sept.
    • PostgreSQL Global Development Group. PostgreSQL 9.1 Documentation, Sept. 2011. http://www.postgresql.org/docs/9.1/static/.
    • (2011) PostgreSQL 9.1 Documentation
  • 28
    • 0003353218 scopus 로고
    • Polyinstantation for cover stories
    • Springer
    • R. Sandhu and S. Jajodia. Polyinstantation for cover stories. In Proc. ESORICS. Springer, 1992.
    • (1992) Proc. ESORICS
    • Sandhu, R.1    Jajodia, S.2
  • 30
    • 84877723783 scopus 로고    scopus 로고
    • Thieves found Citigroup site an easy entry
    • June 13
    • N. Schwartz and E. Dash. Thieves found Citigroup site an easy entry. The New York Times, June 13, 2011. URL https: //www.nytimes.com/2011/06/14/ technology/14security.html.
    • (2011) The New York Times
    • Schwartz, N.1    Dash, E.2
  • 34
    • 84877698434 scopus 로고    scopus 로고
    • Transaction Processing Performance Council, San Jose, CA, 1.8 edition, February
    • TPC Benchmark W (Web Commerce) Specification. Transaction Processing Performance Council, San Jose, CA, 1.8 edition, February 2000.
    • (2000) TPC Benchmark W (Web Commerce) Specification
  • 35
    • 84904097779 scopus 로고    scopus 로고
    • Transaction Processing Performance Council, San Jose, CA, 5.11 edition, February
    • TPC Benchmark C Specification. Transaction Processing Performance Council, San Jose, CA, 5.11 edition, February 2010.
    • (2010) TPC Benchmark C Specification


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.