메뉴 건너뛰기




Volumn 7122 LNCS, Issue , 2012, Pages 104-121

Inference-proof view update transactions with minimal refusals

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84903848955     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28879-1_8     Document Type: Conference Paper
Times cited : (8)

References (19)
  • 1
    • 71649113077 scopus 로고    scopus 로고
    • The inference problem: Maintaining maximal availability in the presence of database updates
    • Toland, T.S., Farkas, C., Eastman, C.M.: The inference problem: Maintaining maximal availability in the presence of database updates. Computers & Security 29(1), 88-103 (2010)
    • (2010) Computers & Security , vol.29 , Issue.1 , pp. 88-103
    • Toland, T.S.1    Farkas, C.2    Eastman, C.M.3
  • 2
    • 0007664281 scopus 로고
    • Inference problems in multilevel secure database management systems
    • Abrams, M.D., Jajodia, S., Podell, H.J. (Eds.) IEEE
    • Jajodia, S., Meadows, C.: Inference problems in multilevel secure database management systems. In: Abrams, M.D., Jajodia, S., Podell, H.J. (Eds.) Information Security: An Integrated Collection of Essays, pp. 570-584. IEEE (1995)
    • (1995) Information Security: An Integrated Collection of Essays , pp. 570-584
    • Jajodia, S.1    Meadows, C.2
  • 3
    • 70350400871 scopus 로고    scopus 로고
    • Requirements and protocols for inference-proof interactions in information systems
    • Backes, M., Ning, P. (Eds.) Springer, Heidelberg
    • Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Requirements and Protocols for Inference-Proof Interactions in Information Systems. In: Backes, M., Ning, P. (Eds.) ESORICS 2009. LNCS, Vol. 5789, pp. 285-302. Springer, Heidelberg (2009)
    • (2009) ESORICS 2009. LNCS , vol.5789 , pp. 285-302
    • Biskup, J.1    Gogolin, C.2    Seiler, J.3    Weibert, T.4
  • 4
    • 84859397510 scopus 로고    scopus 로고
    • Policy-based secrecy in the runs & systems framework and controlled query evaluation
    • Echizen, I., Kunihiro, N., Sasaki, R. (Eds.)
    • Biskup, J., Tadros, C.: Policy-based secrecy in the Runs & Systems framework and controlled query evaluation. In: Echizen, I., Kunihiro, N., Sasaki, R. (Eds.) Short Paper of IWSEC 2010. IPSJ, pp. 60-77 (2010)
    • (2010) Short Paper of IWSEC 2010. IPSJ , pp. 60-77
    • Biskup, J.1    Tadros, C.2
  • 5
    • 77951549976 scopus 로고    scopus 로고
    • Usability confinement of server reactions: Maintaining inference-proof client views by controlled interaction execution
    • Kikuchi, S., Sachdeva, S., Bhalla, S. (Eds.) Springer, Heidelberg
    • Biskup, J.: Usability Confinement of Server Reactions: Maintaining Inference-Proof Client Views by Controlled Interaction Execution. In: Kikuchi, S., Sachdeva, S., Bhalla, S. (Eds.) DNIS 2010. LNCS, Vol. 5999, pp. 80-106. Springer, Heidelberg (2010)
    • (2010) DNIS 2010. LNCS , vol.5999 , pp. 80-106
    • Biskup, J.1
  • 6
    • 79959280117 scopus 로고    scopus 로고
    • Inference-proof view update transactions with forwarded refreshments
    • Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Inference-proof view update transactions with forwarded refreshments. Journal of Computer Security 19(3), 487-529 (2011)
    • (2011) Journal of Computer Security , vol.19 , Issue.3 , pp. 487-529
    • Biskup, J.1    Gogolin, C.2    Seiler, J.3    Weibert, T.4
  • 8
    • 84898316842 scopus 로고    scopus 로고
    • Multilevel databases
    • Rivero, L.C., Doorn, J.H., Ferraggine, V.E. (Eds.) Idea Group
    • Gabillon, A.: Multilevel databases. In: Rivero, L.C., Doorn, J.H., Ferraggine, V.E. (Eds.) Encyclopedia of Database Technologies and Applications, pp. 386-389. Idea Group (2005)
    • (2005) Encyclopedia of Database Technologies and Applications , pp. 386-389
    • Gabillon, A.1
  • 9
    • 79958038774 scopus 로고    scopus 로고
    • A sound and complete model-generation procedure for consistent and confidentiality-preserving databases
    • Biskup, J., Wiese, L.: A sound and complete model-generation procedure for consistent and confidentiality-preserving databases. Theoretical Computer Science 412(31), 4044-4072 (2011)
    • (2011) Theoretical Computer Science , vol.412 , Issue.31 , pp. 4044-4072
    • Biskup, J.1    Wiese, L.2
  • 11
    • 57149136993 scopus 로고    scopus 로고
    • Privacy-preserving data mining - Models and algorithms
    • Springer, Heidelberg
    • Aggarwal, C.C., Yu, P.S. (eds.): Privacy-Preserving Data Mining - Models and Algorithms. Advances in Database Systems, Vol. 34. Springer, Heidelberg (2008)
    • (2008) Advances in Database Systems , vol.34
    • Aggarwal, C.C.1    Yu, P.S.2
  • 14
    • 33745659908 scopus 로고    scopus 로고
    • Controlled query evaluation for enforcing confidentiality in complete information systems
    • Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security 3(1), 14-27 (2004)
    • (2004) International Journal of Information Security , vol.3 , Issue.1 , pp. 14-27
    • Biskup, J.1    Bonatti, P.A.2
  • 15
    • 33646012556 scopus 로고
    • Resolving the tension between integrity and security using a theorem prover
    • Boral, H., Larson, P.Å. (Eds.) ACM Press
    • Mazumdar, S., Stemple, D.W., Sheard, T.: Resolving the tension between integrity and security using a theorem prover. In: Boral, H., Larson, P.Å. (Eds.) SIGMOD Conference 1988, pp. 233-242. ACM Press (1988)
    • (1988) SIGMOD Conference 1988 , pp. 233-242
    • Mazumdar, S.1    Stemple, D.W.2    Sheard, T.3
  • 16
    • 0033100756 scopus 로고    scopus 로고
    • Logical foundations of multilevel databases
    • Cuppens, F., Gabillon, A.: Logical foundations of multilevel databases. Data & Knowledge Engineering 29(3), 259-291 (1999)
    • (1999) Data & Knowledge Engineering , vol.29 , Issue.3 , pp. 259-291
    • Cuppens, F.1    Gabillon, A.2
  • 17
    • 48249156214 scopus 로고    scopus 로고
    • Preprocessing for controlled query evaluation with availability policy
    • Biskup, J., Wiese, L.: Preprocessing for controlled query evaluation with availability policy. Journal of Computer Security 16(4), 477-494 (2008)
    • (2008) Journal of Computer Security , vol.16 , Issue.4 , pp. 477-494
    • Biskup, J.1    Wiese, L.2
  • 18
    • 79960261056 scopus 로고    scopus 로고
    • Enforcing confidentiality and data visibility constraints: An OBDD approach
    • Li, Y. (Ed.) Springer, Heidelberg
    • Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach. In: Li, Y. (Ed.) DBSec 2011. LNCS, Vol. 6818, pp. 44-59. Springer, Heidelberg (2011)
    • (2011) DBSec 2011. LNCS , vol.6818 , pp. 44-59
    • Ciriani, V.1    De Capitani Di Vimercati, S.2    Foresti, S.3    Livraga, G.4    Samarati, P.5
  • 19
    • 79959257426 scopus 로고    scopus 로고
    • Optimization of the controlled evaluation of closed relational queries
    • Gritzalis, D., Lopez, J. (Eds.) Springer, Heidelberg
    • Biskup, J., Lochner, J.-H., Sonntag, S.: Optimization of the Controlled Evaluation of Closed Relational Queries. In: Gritzalis, D., Lopez, J. (Eds.) SEC 2009. IFIP AICT, Vol. 297, pp. 214-225. Springer, Heidelberg (2009)
    • (2009) SEC 2009. IFIP AICT , vol.297 , pp. 214-225
    • Biskup, J.1    Lochner, J.-H.2    Sonntag, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.