ACM SIGMOD Anthology VLDB dblp.uni-trier.de

Protection of Information in Relational Data Bases.

François Bancilhon, Nicolas Spyratos: Protection of Information in Relational Data Bases. VLDB 1977: 494-500
@inproceedings{DBLP:conf/vldb/BancilhonS77,
  author    = {Fran\c{c}ois Bancilhon and
               Nicolas Spyratos},
  title     = {Protection of Information in Relational Data Bases},
  booktitle = {Proceedings of the Third International Conference on Very Large
               Data Bases, October 6-8, 1977, Tokyo, Japan},
  publisher = {IEEE Computer Society},
  year      = {1977},
  pages     = {494-500},
  ee        = {db/conf/vldb/BancilhonS77.html},
  crossref  = {DBLP:conf/vldb/77},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

This paper is concerned with protection of information in relational databases from disclosure to properly identified users. It is assumed that the only means of access to the database is through a relational query language.

The objective of the paper is to formalize the notion of protection. We first describe the information content of the database by a set of propositions and their truth values. The objects to be protected are (the truth values of) certain propositions that have been declared confidential. A query violates a protected proposition if its answer modifies the knowledge of tHe user about (the truth value of) this proposition.

Following this approach, we propose a model for evaluating protection systems. In this model a protection system is characterized by the type of queries it takes as its input, the type of data it can protect, the means of protection against queries (e.g. rejection or modification) and the type of protection it provides (e.g., total protection, partial protection, protection against user's inference). Some examples of the use of the model as a tool for analysis are given.

Copyright © 1977 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

Printed Edition

Proceedings of the Third International Conference on Very Large Data Bases, October 6-8, 1977, Tokyo, Japan. IEEE Computer Society 1977
Contents BibTeX

References

[1]
Morton M. Astrahan, Donald D. Chamberlin: Implementation of a Structured English Query Language. Commun. ACM 18(10): 580-588(1975) BibTeX
[2]
...
[3]
E. F. Codd: Further Normalization of the Data Base Relational Model. IBM Research Report, San Jose, California RJ909: (1971) BibTeX
[4]
E. F. Codd: Relational Completeness of Data Base Sublanguages. In: R. Rustin (ed.): Database Systems: 65-98, Prentice Hall and IBM Research Report RJ 987, San Jose, California : (1972) BibTeX
[5]
Richard A. DeMillo, David P. Dobkin, Richard J. Lipton: Even Data Bases That Lie Can Be Compromised. IEEE Trans. Software Eng. 4(1): 73-75(1978) BibTeX
[6]
David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure Databases: Protection Against User Influence. ACM Trans. Database Syst. 4(1): 97-106(1979) BibTeX
[7]
Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
[8]
...
[9]
...
[10]
John B. Kam, Jeffrey D. Ullman: A Model of Statistical Databases and Their Security. ACM Trans. Database Syst. 2(1): 1-10(1977) BibTeX
[11]
Richard C. Owens Jr.: Evaluation of Access Authorization Characteristics of Derived Data Sets. SIGFIDET Workshop 1971: 263-278 BibTeX
[12]
...
[13]
...

Referenced by

  1. Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian: Foundations of Secure Deductive Databases. IEEE Trans. Knowl. Data Eng. 7(3): 406-422(1995)
  2. Piero A. Bonatti, Sarit Kraus, V. S. Subrahmanian: Declarative Foundations of Secure Deductive Databases. ICDT 1992: 391-406
  3. Subhasish Mazumdar, David W. Stemple, Tim Sheard: Resolving the Tension between Integrity and Security Using a Theorem Prover. SIGMOD Conference 1988: 233-242
  4. George L. Sicherman, Wiebren de Jonge, Reind P. van de Riet: Answering Queries Without Revealing Secrets. ACM Trans. Database Syst. 8(1): 41-59(1983)
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
VLDB Proceedings (1977-1981): Copyright © by IEEE,
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:44:59 2009