Controlling logical inference in multilevel database systems

The potential for logical inference of high-level information based on lower-level visible data presents a threat to multilevel security. The author proposes a framework for studying these inference control problems, describes a representation for relevant semantics of the application, develops criteria for safety and security of a system to prevent these problems, and describes the functionality of the proposed classification tool in terms of a scenario for its use.<<ETX>>

[1]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[2]  Barbara Hayes-Roth,et al.  A Blackboard Architecture for Control , 1985, Artif. Intell..

[3]  Matthew Morgenstern Constraint Equations: Declarative Expression of Constraints With Automatic Enforcement , 1984, VLDB.

[4]  Ronald J. Brachman,et al.  Proceedings of the 1981 KL-ONE Workshop, , 1982 .

[5]  Dorothy E. Denning,et al.  Inference Controls for Statistical Databases , 1983, Computer.

[6]  Matthew Morgenstern,et al.  The Role of Constraints in Databases, Expert Systems, and Knowledge Representation , 1984, Expert Database Workshop.

[7]  Gultekin Özsoyoglu,et al.  Data Dependencies and Inference Control in Multilevel Relational Database Systems , 1987, 1987 IEEE Symposium on Security and Privacy.

[8]  Reind P. van de Riet,et al.  Answering queries without revealing secrets , 1983, TODS.

[9]  Matthew Morgenstern,et al.  Security and inference in multilevel database and knowledge-base systems , 1987, SIGMOD '87.

[10]  Dorothy E. Denning,et al.  A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.

[11]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[12]  Johan de Kleer,et al.  An Assumption-Based TMS , 1987, Artif. Intell..

[13]  T. D. Garvey,et al.  Multilevel security for knowledge based systems , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.

[14]  José Meseguer,et al.  Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.