Security and inference in multilevel database and knowledge-base systems
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
Dynamic disclosure monitor (D2Mon): an improved query processing solution
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
A scheme for inference problems using rough sets and entropy
RSFDGrC'05 Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II
A model-theoretic approach to data anonymity and inference control
Proceedings of the second ACM conference on Data and Application Security and Privacy
An inference detection algorithm based on related tuples mining
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Unauthorized inferences in semistructured databases
Information Sciences: an International Journal
Medical privacy protection based on granular computing
Artificial Intelligence in Medicine
Hi-index | 0.00 |
This paper makes seven contributions to security aggregation research. It identifies inference aggregation and cardinality aggregation as two distinct aspects of the aggregation problem. The paper develops the concept of a semantic relationship graph to describe the relationships between data and then presents inference aggregation as the problem of finding alternative paths between vertices on the graph. An algorithm is presented for processing the semantic relationship graph to discover whether potential inference aggregation problems exist. A method of detecting some aggregation conditions within the DBMS is presented which uses the normal DBMS query language and adds additional catalytic data to the DBMS to permit a query to make the inference. The paper also suggests use of set theory to describe aggregation conditions and the addition of set operations to the DBMS to permit the description of aggregation detection queries.