Secure databases: protection against user influence

  • Authors:
  • David Dobkin;Anita K. Jones;Richard J. Lipton

  • Affiliations:
  • Univ. of Arizona, Tucson;Carnegie-Mellon Univ., Pittsburgh, PA;Yale Univ., New Haven, CT

  • Venue:
  • ACM Transactions on Database Systems (TODS)
  • Year:
  • 1979

Quantified Score

Hi-index 0.00

Visualization

Abstract

Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.