Dynamic inference control
暂无分享,去创建一个
[1] Karl N. Levitt,et al. Data level inference detection in database systems , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[2] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[3] Mark E. Stickel. Elimination of inference channels by optimal upgrading , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Russ Bubley,et al. Randomized algorithms , 1995, CSUR.
[5] Harry S. Delugach,et al. A Fast Algorithm for Detecting Second Paths in Database Inference Analysis , 1995, J. Comput. Secur..
[6] J. H. van Lint,et al. Introduction to Coding Theory , 1982 .
[7] Amit Sahai,et al. Coding Constructions for Blacklisting Problems without Computational Assumptions , 1999, CRYPTO.
[8] Douglas R. Stinson,et al. Key Preassigned Traceability Schemes for Broadcast Encryption , 1998, Selected Areas in Cryptography.
[9] Bhavani M. Thuraisingham,et al. Data mining, national security, privacy and civil liberties , 2002, SKDD.
[10] Bhavani M. Thuraisingham,et al. Secure query-processing strategies , 1989, Computer.
[11] Sujeet Shenoi,et al. Catalytic inference analysis: detecting inference threats due to knowledge discovery , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[12] Harry S. Delugach,et al. Layered Knowledge Chunks for Database Inference , 1993, DBSec.
[13] Teresa F. Lunt,et al. Access Control Policies for Database Systems , 1988, DBSec.
[14] Tsau Young Lin,et al. Inference Secure Multilevel Databases , 1993, DBSec.
[15] Bhavani M. Thuraisingham,et al. The Use of Conceptual Structures for Handling the Inference Problem , 1991, DBSec.
[16] Dorothy E. Denning,et al. A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.
[17] Peter D. Karp,et al. Detection and elimination of inference channels in multilevel relational database systems , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[18] Leonard J. Binns. Implementation Considerations for Inference Detection: Intended vs. Actual Classification , 1993, Database Security.
[19] Thomas H. Hinke,et al. Database Inference Engine Design Approach , 1988, DBSec.
[20] Bhavani Thuraisingham,et al. Recursion theoretic properties of the inference problem in database security , 1991 .
[21] Sushil Jajodia,et al. Enhancing the Controlled Disclosure of Sensitive Information , 1996, ESORICS.
[22] Bhavani M. Thuraisingham. Towards the Design of a Secure Data/Knowledge Base Management System , 1990, Data Knowl. Eng..
[23] Gary W. Smith,et al. Modeling security-relevant data semantics , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[24] Barry Sowerbutts,et al. Database Architectonics and Inferential Security , 1990, DBSec.