Enhancing Privacy Implementations of Database Enquiries

Privacy is an issue of increasing concern to the Internet user. To ensure the continued success of distributed information systems, a reliable information flow must be established in certified but immediately evident ways. We begin   with basic consideration of the privacy problem in the general setting of database enquiries. From there, we develop a simple solution, which we illustrate with a    simple implementation in the programming language Erlang, and conclude by providing an informal security analysis.

[1]  Andreas Pfitzmann,et al.  Properties of protection goals and their integration into a user interface , 2000, Comput. Networks.

[2]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[3]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[4]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[5]  Matthew Hennessy,et al.  The security pi-calculus and non-interference , 2005, J. Log. Algebraic Methods Program..

[6]  Peter J. Denning,et al.  Certification of programs for secure information flow , 1977, CACM.

[7]  John C. Mitchell,et al.  Enterprise privacy promises and enforcement , 2005, WITS '05.

[8]  Application Security of Erlang Concurrent System , 2008 .

[9]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[10]  Florian Kammüller,et al.  Formalizing non-interference for a simple bytecode language in Coq , 2008, Formal Aspects of Computing.

[11]  L. Henrio,et al.  ASPfun: A Functional and Distributed Object Calculus Semantics, Type-system, and Formalization , 2007 .

[12]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[13]  Lawrence Charles Paulson,et al.  ML for the working programmer , 1991 .

[14]  Joe Armstrong,et al.  Programming Erlang: Software for a Concurrent World , 1993 .

[15]  Chanchal Kumar Roy,et al.  Modeling Erlang in the pi-calculus , 2005, ERLANG '05.