1987
DOI: 10.1016/0167-4048(87)90029-0
|View full text |Cite
|
Sign up to set email alerts
|

Security checking in relational database management systems augmented with inference engines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2000
2000
2014
2014

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 76 publications
(28 citation statements)
references
References 6 publications
0
28
0
Order By: Relevance
“…These techniques often result in overclassification of data and, therefore, reduce the availability of data. Techniques in the second category seek to eliminate inference channel violations during query time [5], [11], [15], [18]. If an inference channel is detected, the query is either refused or modified to avoid security violations.…”
Section: Related Work and Their Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…These techniques often result in overclassification of data and, therefore, reduce the availability of data. Techniques in the second category seek to eliminate inference channel violations during query time [5], [11], [15], [18]. If an inference channel is detected, the query is either refused or modified to avoid security violations.…”
Section: Related Work and Their Limitationsmentioning
confidence: 99%
“…However, none of the above works has the formal notion of soundness and completeness for data-dependent and dataindependent disclosure and, thus, cannot establish these formal properties of disclosure inference. Also, most authors [2], [6], [13], [14], [11], [15], [18], with the exception of [5], [7], [16], [3], [4], do not consider the problem of actual inference for specific families of constraints (and its decidability, soundness, completeness, etc. ); rather, they develop a framework, assuming that disclosure inference algorithms are readily available.…”
Section: Related Work and Their Limitationsmentioning
confidence: 99%
“…This work does not consider authorization rules dealing with implicit association of attributes; instead, the authors assume that the user knows the mapping between the attributes of any FD. Other approaches such as [9,27] analyze queries at runtime and if a query creates an inference channel then it is rejected. In [27], both queries and authorization rules are specified using first order logic.…”
Section: Related Workmentioning
confidence: 99%
“…Other approaches such as [9,27] analyze queries at runtime and if a query creates an inference channel then it is rejected. In [27], both queries and authorization rules are specified using first order logic. While the inference engine considers the past queries, the functional dependencies are not taken into account.…”
Section: Related Workmentioning
confidence: 99%
“…Inference channels are removed by modifying the database design andlor by increasing the classification levels of some of the data items. The techniques of the second category seek to eliminate inference channel violations during query processing time [5,10,12,13,16,19]. If an inference channel is detected, the query is either refused or modified to avoid security violations.…”
Section: Introductionmentioning
confidence: 99%