-
1
-
-
71649113077
-
The inference problem: Maintaining maximal availability in the presence of database updates
-
Toland, T.S., Farkas, C., Eastman, C.M.: The inference problem: Maintaining maximal availability in the presence of database updates. Computers & Security 29(1), 88-103 (2010)
-
(2010)
Computers & Security
, vol.29
, Issue.1
, pp. 88-103
-
-
Toland, T.S.1
Farkas, C.2
Eastman, C.M.3
-
2
-
-
0007664281
-
Inference problems in multilevel secure database management systems
-
Abrams, M.D., Jajodia, S., Podell, H.J. (Eds.) IEEE
-
Jajodia, S., Meadows, C.: Inference problems in multilevel secure database management systems. In: Abrams, M.D., Jajodia, S., Podell, H.J. (Eds.) Information Security: An Integrated Collection of Essays, pp. 570-584. IEEE (1995)
-
(1995)
Information Security: An Integrated Collection of Essays
, pp. 570-584
-
-
Jajodia, S.1
Meadows, C.2
-
3
-
-
70350400871
-
Requirements and protocols for inference-proof interactions in information systems
-
Backes, M., Ning, P. (Eds.) Springer, Heidelberg
-
Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Requirements and Protocols for Inference-Proof Interactions in Information Systems. In: Backes, M., Ning, P. (Eds.) ESORICS 2009. LNCS, Vol. 5789, pp. 285-302. Springer, Heidelberg (2009)
-
(2009)
ESORICS 2009. LNCS
, vol.5789
, pp. 285-302
-
-
Biskup, J.1
Gogolin, C.2
Seiler, J.3
Weibert, T.4
-
4
-
-
84859397510
-
Policy-based secrecy in the runs & systems framework and controlled query evaluation
-
Echizen, I., Kunihiro, N., Sasaki, R. (Eds.)
-
Biskup, J., Tadros, C.: Policy-based secrecy in the Runs & Systems framework and controlled query evaluation. In: Echizen, I., Kunihiro, N., Sasaki, R. (Eds.) Short Paper of IWSEC 2010. IPSJ, pp. 60-77 (2010)
-
(2010)
Short Paper of IWSEC 2010. IPSJ
, pp. 60-77
-
-
Biskup, J.1
Tadros, C.2
-
5
-
-
77951549976
-
Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction execution
-
Kikuchi, S., Sachdeva, S., Bhalla, S. (Eds.) Springer, Heidelberg
-
Biskup, J.: Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution. In: Kikuchi, S., Sachdeva, S., Bhalla, S. (Eds.) DNIS 2010. LNCS, Vol. 5999, pp. 80-106. Springer, Heidelberg (2010)
-
(2010)
DNIS 2010. LNCS
, vol.5999
, pp. 80-106
-
-
Biskup, J.1
-
6
-
-
79959280117
-
Inference-proof view update transactions with forwarded refreshments
-
Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Inference-proof view update transactions with forwarded refreshments. Journal of Computer Security 19(3), 487-529 (2011)
-
(2011)
Journal of Computer Security
, vol.19
, Issue.3
, pp. 487-529
-
-
Biskup, J.1
Gogolin, C.2
Seiler, J.3
Weibert, T.4
-
8
-
-
84898316842
-
Multilevel databases
-
Rivero, L.C., Doorn, J.H., Ferraggine, V.E. (Eds.) Idea Group
-
Gabillon, A.: Multilevel databases. In: Rivero, L.C., Doorn, J.H., Ferraggine, V.E. (Eds.) Encyclopedia of Database Technologies and Applications, pp. 386-389. Idea Group (2005)
-
(2005)
Encyclopedia of Database Technologies and Applications
, pp. 386-389
-
-
Gabillon, A.1
-
9
-
-
79958038774
-
A sound and complete model-generation procedure for consistent and confidentiality-preserving databases
-
Biskup, J., Wiese, L.: A sound and complete model-generation procedure for consistent and confidentiality-preserving databases. Theoretical Computer Science 412(31), 4044-4072 (2011)
-
(2011)
Theoretical Computer Science
, vol.412
, Issue.31
, pp. 4044-4072
-
-
Biskup, J.1
Wiese, L.2
-
10
-
-
3042717763
-
Maximizing sharing of protected information
-
Dawson, S., di Vimercati, S.D.C., Lincoln, P., Samarati, P.: Maximizing sharing of protected information. Journal of Computer and System Sciences 64(3), 496-541 (2002)
-
(2002)
Journal of Computer and System Sciences
, vol.64
, Issue.3
, pp. 496-541
-
-
Dawson, S.1
Di Vimercati, S.D.C.2
Lincoln, P.3
Samarati, P.4
-
11
-
-
57149136993
-
Privacy-preserving data mining - Models and algorithms
-
Springer, Heidelberg
-
Aggarwal, C.C., Yu, P.S. (eds.): Privacy-Preserving Data Mining - Models and Algorithms. Advances in Database Systems, Vol. 34. Springer, Heidelberg (2008)
-
(2008)
Advances in Database Systems
, vol.34
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
12
-
-
0034951888
-
Multilevel security transaction processing
-
Jajodia, S., Atluri, V., Keefe, T.F., McCollum, C.D., Mukkamala, R.: Multilevel security transaction processing. Journal of Computer Security 9(3), 165-195 (2001)
-
(2001)
Journal of Computer Security
, vol.9
, Issue.3
, pp. 165-195
-
-
Jajodia, S.1
Atluri, V.2
Keefe, T.F.3
McCollum, C.D.4
Mukkamala, R.5
-
14
-
-
33745659908
-
Controlled query evaluation for enforcing confidentiality in complete information systems
-
Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security 3(1), 14-27 (2004)
-
(2004)
International Journal of Information Security
, vol.3
, Issue.1
, pp. 14-27
-
-
Biskup, J.1
Bonatti, P.A.2
-
15
-
-
33646012556
-
Resolving the tension between integrity and security using a theorem prover
-
Boral, H., Larson, P.Å. (Eds.) ACM Press
-
Mazumdar, S., Stemple, D.W., Sheard, T.: Resolving the tension between integrity and security using a theorem prover. In: Boral, H., Larson, P.Å. (Eds.) SIGMOD Conference 1988, pp. 233-242. ACM Press (1988)
-
(1988)
SIGMOD Conference 1988
, pp. 233-242
-
-
Mazumdar, S.1
Stemple, D.W.2
Sheard, T.3
-
16
-
-
0033100756
-
Logical foundations of multilevel databases
-
Cuppens, F., Gabillon, A.: Logical foundations of multilevel databases. Data & Knowledge Engineering 29(3), 259-291 (1999)
-
(1999)
Data & Knowledge Engineering
, vol.29
, Issue.3
, pp. 259-291
-
-
Cuppens, F.1
Gabillon, A.2
-
17
-
-
48249156214
-
Preprocessing for controlled query evaluation with availability policy
-
Biskup, J., Wiese, L.: Preprocessing for controlled query evaluation with availability policy. Journal of Computer Security 16(4), 477-494 (2008)
-
(2008)
Journal of Computer Security
, vol.16
, Issue.4
, pp. 477-494
-
-
Biskup, J.1
Wiese, L.2
-
18
-
-
79960261056
-
Enforcing confidentiality and data visibility constraints: An OBDD approach
-
Li, Y. (Ed.) Springer, Heidelberg
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach. In: Li, Y. (Ed.) DBSec 2011. LNCS, Vol. 6818, pp. 44-59. Springer, Heidelberg (2011)
-
(2011)
DBSec 2011. LNCS
, vol.6818
, pp. 44-59
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Livraga, G.4
Samarati, P.5
-
19
-
-
79959257426
-
Optimization of the controlled evaluation of closed relational queries
-
Gritzalis, D., Lopez, J. (Eds.) Springer, Heidelberg
-
Biskup, J., Lochner, J.-H., Sonntag, S.: Optimization of the Controlled Evaluation of Closed Relational Queries. In: Gritzalis, D., Lopez, J. (Eds.) SEC 2009. IFIP AICT, Vol. 297, pp. 214-225. Springer, Heidelberg (2009)
-
(2009)
SEC 2009. IFIP AICT
, vol.297
, pp. 214-225
-
-
Biskup, J.1
Lochner, J.-H.2
Sonntag, S.3
|