The inference problem: Maintaining maximal availability in the presence of database updates
暂无分享,去创建一个
[1] Csilla Farkas,et al. Dynamic Disclosure Monitor (D2Mon): An Improved Query Processing Solution , 2005, Secure Data Management.
[2] S. Jajodia,et al. Information Security: An Integrated Collection of Essays , 1994 .
[3] Karl N. Levitt,et al. Data level inference detection in database systems , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[4] Bhavani M. Thuraisingham,et al. Design of LDV: a multilevel secure relational database management system , 1990 .
[5] Sushil Jajodia,et al. The inference problem: a survey , 2002, SKDD.
[6] Harry S. Delugach,et al. Wizard: A Database Inference Analysis and Detection System , 1996, IEEE Trans. Knowl. Data Eng..
[7] Bhavani M. Thuraisingham,et al. Database and Applications Security: Integrating Information Security and Data Management , 2005 .
[8] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[9] Josep Domingo-Ferrer,et al. Inference Control in Statistical Databases, From Theory to Practice , 2002 .
[10] Toru Fujiwara,et al. Security against Inference Attacks on Negative Information in Object-Oriented Databases , 2002, ICICS.
[11] Jeffrey D. Ullman,et al. Principles Of Database And Knowledge-Base Systems , 1979 .
[12] Sabrina De Capitani di Vimercati,et al. Specification and enforcement of classification and inference constraints , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[13] D.G. Marks,et al. Inference in MLS Database Systems , 1996, IEEE Trans. Knowl. Data Eng..
[14] Yu Chen,et al. Protection of Database Security via Collaborative Inference Detection , 2008, IEEE Transactions on Knowledge and Data Engineering.
[15] Thomas H. Hinke,et al. Inference aggregation detection in database management systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[16] Csilla Farkas,et al. The Inference Problem and Updates in Relational Databases , 2001, DBSec.
[17] Josep Domingo-Ferrer,et al. Privacy in Statistical Databases: CASC Project International Workshop, PSD 2004, Barcelona, Spain, June 9-11, 2004, Proceedings , 2004 .
[18] Jeffrey D. Ullman,et al. Principles of Database and Knowledge-Base Systems, Volume II , 1988, Principles of computer science series.
[19] Randall P. Wolf,et al. Protecting databases from inference attacks , 1997, Comput. Secur..
[20] Josep Domingo-Ferrer,et al. Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation , 2005, Data Mining and Knowledge Discovery.
[21] Gary W. Smith,et al. Modeling security-relevant data semantics , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[22] Leoan J. Buczkowski. Database Inference Controller , 1989, Database Security.
[23] Sushil Jajodia,et al. Enhancing the Controlled Disclosure of Sensitive Information , 1996, ESORICS.
[24] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[25] David W. Stemple,et al. Resolving the tension between integrity and security using a theorem prover , 1988, SIGMOD '88.
[26] Josep Domingo-Ferrer,et al. Privacy in Data Mining , 2005, Data Mining and Knowledge Discovery.
[27] Jessica Staddon,et al. Dynamic inference control , 2003, DMKD '03.
[28] Reind P. van de Riet,et al. Answering queries without revealing secrets , 1983, TODS.
[29] Bhavani M. Thuraisingham,et al. Security checking in relational database management systems augmented with inference engines , 1987, Comput. Secur..
[30] Sushil Jajodia,et al. Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..
[31] Dorothy E. Denning,et al. Commutative Filters for Reducing Inference Threats in Multilevel Database Systems , 1985, 1985 IEEE Symposium on Security and Privacy.
[32] Sushil Jajodia,et al. Inference Problems in Multilevel Secure Database Management Systems , 2006 .
[33] Bhavani M. Thuraisingham,et al. Secure query-processing strategies , 1989, Computer.
[34] L. Willenborg,et al. Elements of Statistical Disclosure Control , 2000 .
[35] Gultekin Özsoyoglu,et al. Controlling FD and MVD Inferences in Multilevel Relational Database Systems , 1991, IEEE Trans. Knowl. Data Eng..
[36] Matthew Morgenstern,et al. Controlling logical inference in multilevel database systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[37] Randall P. Wolf,et al. A Framework for Inference-Directed Data Mining , 1996, DBSec.
[38] Joachim Biskup,et al. Lying versus refusal for known potential secrets , 2001, Data Knowl. Eng..
[39] Sabrina De Capitani di Vimercati,et al. Minimal data upgrading to prevent inference and association attacks , 1999, PODS '99.
[40] David P. Woodruff,et al. Private inference control , 2004, CCS '04.
[41] Harry S. Delugach,et al. A Fast Algorithm for Detecting Second Paths in Database Inference Analysis , 1995, J. Comput. Secur..
[42] Wesley W. Chu,et al. Database Security Protection Via Inference Detection , 2006, ISI.