Secure Databases: Protection Against User Influence.
David P. Dobkin, Anita K. Jones, Richard J. Lipton:
Secure Databases: Protection Against User Influence.
ACM Trans. Database Syst. 4(1): 97-106(1979)@article{DBLP:journals/tods/DobkinJL79,
author = {David P. Dobkin and
Anita K. Jones and
Richard J. Lipton},
title = {Secure Databases: Protection Against User Influence},
journal = {ACM Trans. Database Syst.},
volume = {4},
number = {1},
year = {1979},
pages = {97-106},
ee = {http://doi.acm.org/10.1145/320064.320068, db/journals/tods/DobkinJL79.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
Users may be able to compromise databases by asking a series of questions and then
inferring new information from the answers. The complexity of protecting a
database against this technique is discussed here.
Copyright © 1979 by the ACM,
Inc., used by permission. Permission to make
digital or hard copies is granted provided that
copies are not made or distributed for profit or
direct commercial advantage, and that copies show
this notice on the first page or initial screen of
a display along with the full citation.
CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 2" and ...
BibTeX
References
- [1]
- E. F. Codd:
A Relational Model of Data for Large Shared Data Banks.
Commun. ACM 13(6): 377-387(1970) BibTeX
- [2]
- Richard A. DeMillo, David P. Dobkin, Richard J. Lipton:
Even Data Bases That Lie Can Be Compromised.
IEEE Trans. Software Eng. 4(1): 73-75(1978) BibTeX
- [3]
- Dorothy E. Denning:
A Lattice Model of Secure Information Flow.
Commun. ACM 19(5): 236-243(1976) BibTeX
- [4]
- J. S. Fenton:
Memoryless Subsystems.
Comput. J. 17(2): 143-147(1974) BibTeX
- [5]
- ...
- [6]
- ...
- [7]
- ...
- [8]
- Anita K. Jones, Richard J. Lipton:
The Enforcement of Security Policies for Computation.
J. Comput. Syst. Sci. 17(1): 35-55(1978) BibTeX
- [9]
- Anita K. Jones, William A. Wulf:
Towards the Design of Secure Systems.
Softw., Pract. Exper. 5(4): 321-336(1975) BibTeX
- [10]
- ...
- [11]
- ...
- [12]
- William A. Wulf, Ellis S. Cohen, William M. Corwin, Anita K. Jones, Roy Levin, C. Pierson, Fred J. Pollack:
HYDRA: The Kernel of a Multiprocessor Operating System.
Commun. ACM 17(6): 337-345(1974) BibTeX
Referenced by
- Rakesh Agrawal, Ramakrishnan Srikant:
Privacy-Preserving Data Mining.
SIGMOD Conference 2000: 439-450
- Jon M. Kleinberg, Christos H. Papadimitriou, Prabhakar Raghavan:
Auditing Boolean Attributes.
PODS 2000: 86-91
- Keishi Tajima:
Static Detection of Security Flaws in Object-Oriented Databases.
SIGMOD Conference 1996: 341-352
- Mary McLeish:
Further Results on the Security of Partitioned Dynamic Statistical Databases.
ACM Trans. Database Syst. 14(1): 98-113(1989)
- Nabil R. Adam, John C. Wortmann:
Security-Control Methods for Statistical Databases: A Comparative Study.
ACM Comput. Surv. 21(4): 515-556(1989)
- Subhasish Mazumdar, David W. Stemple, Tim Sheard:
Resolving the Tension between Integrity and Security Using a Theorem Prover.
SIGMOD Conference 1988: 233-242
- Chong K. Liew, Uinam J. Choi, Chung J. Liew:
A Data Distortion by Probability Distribution.
ACM Trans. Database Syst. 10(3): 395-411(1985)
- Joseph F. Traub, Yechiam Yemini, Henryk Wozniakowski:
The Statistical Security of a Statistical Database.
ACM Trans. Database Syst. 9(4): 672-679(1984)
- Steven P. Reiss:
Practical Data-Swapping: The First Steps.
ACM Trans. Database Syst. 9(1): 20-37(1984)
- Robert P. Trueblood, H. Rex Hartson, Johannes J. Martin:
MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management.
ACM Trans. Database Syst. 8(3): 382-409(1983)
- Wiebren de Jonge:
Compromising Statistical Databases Responding to Queries about Means.
ACM Trans. Database Syst. 8(1): 60-80(1983)
- Zbigniew Michalewicz:
Statistical Databases: Their Model, Query Language and Security.
SSDBM 1983: 391-402
- Dorothy E. Denning:
A Security Model for the Statistical Database Problem.
SSDBM 1983: 368-390
- Arie Shoshani:
Statistical Databases: Characteristics, Problems, and some Solutions.
VLDB 1982: 208-222
- Ernst L. Leiss:
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise.
VLDB 1982: 189-196
- Francis Y. L. Chin, Gultekin Özsoyoglu:
Statistical Database Design.
ACM Trans. Database Syst. 6(1): 113-139(1981)
- Jitender S. Deogun, Vijay V. Raghavan:
Query Directed Partitioning Scheme for Securing Statistical Databases.
SSDBM 1981: 285-293
- Jan Schlörer:
Disclosure from Statistical Databases: Quantitative Aspects of Trackers.
ACM Trans. Database Syst. 5(4): 467-492(1980)
- Dorothy E. Denning, Jan Schlörer:
A Fast Procedure for Finding a Tracker in a Statistical Database.
ACM Trans. Database Syst. 5(1): 88-102(1980)
- Dorothy E. Denning:
Secure Statistical Databases with Random Sample Queries.
ACM Trans. Database Syst. 5(3): 291-315(1980)
- Leland L. Beck:
A Security Mechanism for Statistical Databases.
ACM Trans. Database Syst. 5(3): 316-338(1980)
- Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning:
Linear Queries in Statistical Databases.
ACM Trans. Database Syst. 4(2): 156-167(1979)
- Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz:
The Tracker: A Threat to Statistical Database Security.
ACM Trans. Database Syst. 4(1): 76-96(1979)
- Rainer Hüber, Peter C. Lockemann:
Information Protection by Method Base Systems.
VLDB 1978: 420-426
- John B. Kam, Jeffrey D. Ullman:
A Model of Statistical Databases and Their Security.
ACM Trans. Database Syst. 2(1): 1-10(1977)
- François Bancilhon, Nicolas Spyratos:
Protection of Information in Relational Data Bases.
VLDB 1977: 494-500
- Clement T. Yu, Francis Y. L. Chin:
A Study on the Protection of Statistical Data Bases.
SIGMOD Conference 1977: 169-181
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:40 2008