Auditing Inference Based Disclosures in Dynamic Databases
暂无分享,去创建一个
Anand Gupta | Vikram Goyal | Manish Singh | Shyam K. Gupta | Vikram Goyal | Manish Singh | S. Gupta | Anand Gupta
[1] Alfred V. Aho,et al. Equivalences Among Relational Expressions , 1979, SIAM J. Comput..
[2] Csilla Farkas,et al. The Inference Problem and Updates in Relational Databases , 2001, DBSec.
[3] Anand Gupta,et al. Malafide Intension Based Detection of Privacy Violation in Information System , 2006, ICISS.
[4] Christos Faloutsos,et al. Auditing Compliance with a Hippocratic Database , 2004, VLDB.
[5] Jeffrey D. Ullman,et al. Principles of Database and Knowledge-Base Systems, Volume II , 1988, Principles of computer science series.
[6] D.G. Marks,et al. Inference in MLS Database Systems , 1996, IEEE Trans. Knowl. Data Eng..
[7] Rajeev Motwani,et al. Auditing a Batch of SQL Queries , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.
[8] Bhavani M. Thuraisingham,et al. Design of LDV: a multilevel secure relational database management system , 1990 .
[9] Sabrina De Capitani di Vimercati,et al. Specification and enforcement of classification and inference constraints , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[10] Stefan Böttcher,et al. Detecting Privacy Violations in Sensitive XML Databases , 2005, Secure Data Management.
[11] Dan Suciu,et al. A formal analysis of information disclosure in data exchange , 2007, J. Comput. Syst. Sci..
[12] Ashwin Machanavajjhala,et al. On the efficiency of checking perfect privacy , 2006, PODS '06.
[13] Ashok K. Chandra,et al. Optimal implementation of conjunctive queries in relational data bases , 1977, STOC '77.
[14] Anand Gupta,et al. A Unified Audit Expression Model for Auditing SQL Queries , 2008, DBSec.
[15] Jeffrey D. Ullman,et al. Principles Of Database And Knowledge-Base Systems , 1979 .
[16] Sushil Jajodia,et al. Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..
[17] Emilie Lundin Barse. Logging for Intrusion and Fraud Detection , 2004 .