2008 IEEE 24th International Conference on Data Engineering 2008
DOI: 10.1109/icde.2008.4497437
|View full text |Cite
|
Sign up to set email alerts
|

Auditing SQL Queries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(27 citation statements)
references
References 10 publications
0
27
0
Order By: Relevance
“…Two fundamentally different approaches have been adopted. One is data instance-independent including the notion of perfect privacy [19,16] and slightly weaker alternatives such as weak syntactic suspiciousness [20]. The other is instance-dependent [1,14], where a query is said to access a sensitive record if deleting the record changes its result.…”
Section: Auditing Semanticsmentioning
confidence: 99%
“…Two fundamentally different approaches have been adopted. One is data instance-independent including the notion of perfect privacy [19,16] and slightly weaker alternatives such as weak syntactic suspiciousness [20]. The other is instance-dependent [1,14], where a query is said to access a sensitive record if deleting the record changes its result.…”
Section: Auditing Semanticsmentioning
confidence: 99%
“…[2] builds a practical system for detecting "suspicious" select-project-join queries, however the privacy guarantees of their definition of suspiciousness are not made explicit. [17] suggests other notions of suspiciousness that lie in between those of [16] and [2] both in terms of their disclosure detection guarantees and the ease of auditing under them.…”
Section: Readingmentioning
confidence: 99%
“…For example, although it does not present itself as a DIDS, the work in [20] describes a method for auditing SQL queries to measure their suspiciousness from a privacy and confidentiality perspective that may be useful for intrusion detection purposes. A generic survey on how data mining techniques can be applied to intrusion detection is shown in [23], and an extensive survey on SQL injection is given in [14].…”
Section: Intrusion Response and Preventionmentioning
confidence: 99%