메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1411-1422

Explainable security for relational databases

Author keywords

Access control; Database security; View rewriting

Indexed keywords

QUERY PROCESSING;

EID: 84904325927     PISSN: 07308078     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2588555.2593663     Document Type: Conference Paper
Times cited : (30)

References (24)
  • 1
    • 84904327756 scopus 로고    scopus 로고
    • https://github.com/JSQLParser/JSqlParser.
  • 2
    • 84888998912 scopus 로고    scopus 로고
    • Android permissions. http://developer.android.com/guide/topics/security/ permissions.html.
    • Android Permissions
  • 5
    • 84904283477 scopus 로고    scopus 로고
    • Label-based access control (lbac) overview. http://publib.boulder.ibm. com/infocenter/db2luw/v9/index.jsp?topic=%2Fcom.ibm.db2.udb. admin.doc%2Fdoc%2Fc0021114.htm.
    • Label-based Access Control (Lbac) Overview
  • 6
    • 84904369191 scopus 로고    scopus 로고
    • Virtual private database. http://www.oracle.com/technetwork/database/ security/index-088277.html.
    • Virtual Private Database
  • 7
    • 84962460473 scopus 로고    scopus 로고
    • Secpal: Design and semantics of a decentralized authorization language
    • Moritz Y Becker, Cédric Fournet, and Andrew D Gordon. Secpal: Design and semantics of a decentralized authorization language. CSF, 2006.
    • (2006) CSF
    • Becker, M.Y.1    Fournet, C.2    Gordon, A.D.3
  • 8
    • 84880566531 scopus 로고    scopus 로고
    • Fine-grained disclosure control for app ecosystems
    • Gabriel M Bender, Lucja Kot, Johannes Gehrke, and Christoph Koch. Fine-grained disclosure control for app ecosystems. SIGMOD, 2013.
    • (2013) SIGMOD
    • Bender, G.M.1    Kot, L.2    Gehrke, J.3    Koch, C.4
  • 10
    • 0034314077 scopus 로고    scopus 로고
    • Secure databases: Constraints, inference channels, and monitoring disclosures
    • Alexander Brodsky, Csilla Farkas, and Sushil Jajodia. Secure databases: Constraints, inference channels, and monitoring disclosures. TKDE, 12(6):900-919, 2000.
    • (2000) TKDE , vol.12 , Issue.6 , pp. 900-919
    • Brodsky, A.1    Farkas, C.2    Jajodia, S.3
  • 11
    • 84958776545 scopus 로고
    • Optimal implementation of conjunctive queries in relational data bases
    • Ashok K Chandra and Philip M Merlin. Optimal implementation of conjunctive queries in relational data bases. STOC, 1977.
    • (1977) STOC
    • Chandra, A.K.1    Merlin, P.M.2
  • 12
    • 34548810781 scopus 로고    scopus 로고
    • Fine grained authorization through predicated grants
    • Surajit Chaudhuri, Tanmoy Dutta, and S Sudarshan. Fine grained authorization through predicated grants. ICDE, 2007.
    • (2007) ICDE
    • Chaudhuri, S.1    Dutta, T.2    Sudarshan, S.3
  • 13
    • 0027885003 scopus 로고
    • Optimization of real conjunctive queries
    • Surajit Chaudhuri and Moshe Y Vardi. Optimization of real conjunctive queries. SIGMOD, 1993.
    • (1993) SIGMOD
    • Chaudhuri, S.1    Vardi, M.Y.2
  • 14
    • 67649565844 scopus 로고    scopus 로고
    • Equivalence of queries that are sensitive to multiplicities
    • Sara Cohen. Equivalence of queries that are sensitive to multiplicities. VLDB, 2009.
    • (2009) VLDB
    • Cohen, S.1
  • 18
    • 85019665607 scopus 로고
    • A lattice of information
    • Jaisook Landauer and Timothy Redmond. A lattice of information. CSFW, 1993.
    • (1993) CSFW
    • Landauer, J.1    Redmond, T.2
  • 19
    • 77955211754 scopus 로고    scopus 로고
    • Views and queries: Determinacy and rewriting
    • Alan Nash, Luc Segoufin, and Victor Vianu. Views and queries: Determinacy and rewriting. TODS, 2010.
    • (2010) TODS
    • Nash, A.1    Segoufin, L.2    Vianu, V.3
  • 20
    • 69949149767 scopus 로고    scopus 로고
    • A formal framework for reective database access control policies
    • Lars E Olson, Carl A Gunter, and P Madhusudan. A formal framework for reective database access control policies. CCS, 2008.
    • (2008) CCS
    • Olson, L.E.1    Gunter, C.A.2    Madhusudan, P.3
  • 22
    • 3142702944 scopus 로고    scopus 로고
    • Extending query rewriting techniques for fine-grained access control
    • Shariq Rizvi, Alberto Mendelzon, Sundararajarao Sudarshan, and Prasan Roy. Extending query rewriting techniques for fine-grained access control. SIGMOD, 2004.
    • (2004) SIGMOD
    • Rizvi, S.1    Mendelzon, A.2    Sudarshan, S.3    Roy, P.4
  • 23
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Jerome H Saltzer and Michael D Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 24
    • 79959832939 scopus 로고    scopus 로고
    • Nexus authorization logic (nal): Design rationale and applications
    • Fred B Schneider, Kevin Walsh, and Emin Gün Sirer. Nexus authorization logic (nal): Design rationale and applications. TISSEC, 14(1), 2011.
    • (2011) TISSEC , vol.14 , Issue.1
    • Schneider, F.B.1    Walsh, K.2    Sirer, E.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.