Security checking in relational database management systems augmented with inference engines
Computers and Security
Principles of database and knowledge-base systems, Vol. I
Principles of database and knowledge-base systems, Vol. I
Resolving the tension between integrity and security using a theorem prover
SIGMOD '88 Proceedings of the 1988 ACM SIGMOD international conference on Management of data
A query language and optimization techniques for unstructured data
SIGMOD '96 Proceedings of the 1996 ACM SIGMOD international conference on Management of data
Privacy lost, anytime, anywhere
Communications of the ACM
Clearing the way for physicians' use of clinical information systems
Communications of the ACM
Privacy, information technology, and health care
Communications of the ACM
Towards a logical formalization of responsibility
Proceedings of the 6th international conference on Artificial intelligence and law
Lore: a database management system for semistructured data
ACM SIGMOD Record
Web security sourcebook
Path constraints on semistructured and structured data
PODS '98 Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Web security: a step-by-step reference guide
Web security: a step-by-step reference guide
Minimal data upgrading to prevent inference and association attacks
PODS '99 Proceedings of the eighteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
Answering queries without revealing secrets
ACM Transactions on Database Systems (TODS)
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
A fast procedure for finding a tracker in a statistical database
ACM Transactions on Database Systems (TODS)
Security in statistical databases for queries with small counts
ACM Transactions on Database Systems (TODS)
A model of statistical database their security
ACM Transactions on Database Systems (TODS)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Design and implementation of an access control processor for XML documents
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
Path constraints in semistructured databases
Journal of Computer and System Sciences - Special issue on the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems
Constraints for semistructured data and XML
ACM SIGMOD Record
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Mobile data and transaction management
Information Sciences—Informatics and Computer Science: An International Journal
Design of LDV: A Multilevel Secure Relational Database Management
IEEE Transactions on Knowledge and Data Engineering
Inference in MLS Database Systems
IEEE Transactions on Knowledge and Data Engineering
Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures
IEEE Transactions on Knowledge and Data Engineering
Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines
IEEE Expert: Intelligent Systems and Their Applications
The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract)
Proceedings of the Fifth International Conference on Data Engineering
ICDT '97 Proceedings of the 6th International Conference on Database Theory
Web Implementation of a Securtty Mediator for Medical Databases
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
A Modal Logical Framework for Security Policies
ISMIS '97 Proceedings of the 10th International Symposium on Foundations of Intelligent Systems
A Logical Model for Privacy Protection
ISC '01 Proceedings of the 4th International Conference on Information Security
Quantifying Privacy Leakage through Answering Database Queries
ISC '02 Proceedings of the 5th International Conference on Information Security
Human exploration and development of space: using XML database space wide web
Information Sciences—Informatics and Computer Science: An International Journal - Internet computing
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
A stratification-based approach for handling conflicts in access control
Proceedings of the eighth ACM symposium on Access control models and technologies
Handbook of massive data sets
Dynamic Aspects of the InfoPriv Model for Information Privacy
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
Privacy and Confidentiality in Healthcare Delivery Information System
CBMS '99 Proceedings of the 12th IEEE Symposium on Computer-Based Medical Systems
Provisions and Obligations in Policy Rule Management
Journal of Network and Systems Management
Editorial: medical expert systems
Information Sciences: an International Journal - Special issue: Medical expert systems
Mining diagnostic rules from clinical databases using rough sets and medical diagnostic model
Information Sciences: an International Journal - Special issue: Medical expert systems
A web-based spatial data access system using semantic R-trees
Information Sciences—Informatics and Computer Science: An International Journal
XML application schema matching using similarity measure and relaxation labeling
Information Sciences: an International Journal
Inference aggregation detection in database management systems
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Controlling logical inference in multilevel database systems
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Graph-theoretic method for merging security system specifications
Information Sciences: an International Journal
Survey of modular ontology techniques and their applications in the biomedical domain
Integrated Computer-Aided Engineering - Selected papers from the IEEE Conference on Information Reuse and Integration (IRI), July 13-15, 2008
A systematic literature review of inference strategies
International Journal of Information and Computer Security
Secrecy-preserving query answering for instance checking in EL
RR'10 Proceedings of the Fourth international conference on Web reasoning and rule systems
Hi-index | 0.07 |
In this paper we study the problem of providing controlled access to confidential data stored in semistructured databases. More specifically, we focus on privacy violations via data inferences that occur when domain knowledge is combined with non-private data. We propose a formal model, called Privacy Information Flow Model, to represent the information flow and the privacy requirements. These privacy requirements are enforced by the Privacy Mediator. Privacy Mediator guarantees that users are not be able to logically entail information that violates the privacy requirements. We present an inference algorithm that is sound and complete. The inference algorithm is developed for a tree-like, semistructured data model, selection-projection queries, and domain knowledge, represented as Horn-clause constraints.