Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
On the Identification of Covert Storage Channels in Secure Systems
IEEE Transactions on Software Engineering
A lattice model of secure information flow
Communications of the ACM
A note on the confinement problem
Communications of the ACM
Cryptography and data security
Cryptography and data security
Program confinement in KVM/370
ACM '77 Proceedings of the 1977 annual conference
Hi-index | 0.00 |
Inference is a powerful act of the mind that combines known data using human judgement in such a way as to extend knowledge, i.e., creation of new information. People can use the information stored in a computer or the behavior of the computer to gain knowledge for which they have no authorization. This is considered a security or confidentiality breach and is the subject of the area of computer security known as inferential security. This paper provides an overview of inferential security breach and some of the known closed form methods for perpetrating this type of security breach. Some of the concerns for the user of individual computing environments (ICE's) are addressed.