On the implementation of a simple class of logic queries for databases
PODS '86 Proceedings of the fifth ACM SIGACT-SIGMOD symposium on Principles of database systems
Magic sets and other strange ways to implement logic programs (extended abstract)
PODS '86 Proceedings of the fifth ACM SIGACT-SIGMOD symposium on Principles of database systems
Foundations of logic programming; (2nd extended ed.)
Foundations of logic programming; (2nd extended ed.)
The personal model of data: towards a privacy-oriented information system
Computers and Security
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Nonmonotonic reasoning, preferential models and cumulative logics
Artificial Intelligence
Control of confidentiality in databases
Computers and Security
Proceedings of the first international workshop on Logic programming and non-monotonic reasoning
Proceedings of the first international workshop on Logic programming and non-monotonic reasoning
Foundations of secure deductive databases
Foundations of secure deductive databases
Implementing deductive databases by linear programming
PODS '92 Proceedings of the eleventh ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Computing circumscriptive databases, I: theory and algorithms
Information and Computation
Answering queries without revealing secrets
ACM Transactions on Database Systems (TODS)
Cryptography and data security
Cryptography and data security
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Controlling FD and MVD Inferences in Multilevel Relational Database Systems
IEEE Transactions on Knowledge and Data Engineering
A Modal Logic Framework to Solve Aggregation Problems
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
The complexity of relational query languages (Extended Abstract)
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Belief reasoning in MLS deductive databases
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
Lying versus refusal for known potential secrets
Data Engineering
Protecting deductive databases from unauthorized retrieval and update requests
Data & Knowledge Engineering - Data and applications security
A Model Theoretic Semantics for Multi-level Secure Deductive Databases
ICLP '02 Proceedings of the 18th International Conference on Logic Programming
Access Control for Deductive Databases by Logic Programming
ICLP '02 Proceedings of the 18th International Conference on Logic Programming
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Controlled Query Evaluation for Known Policies by Combining Lying and Refusal
FoIKS '02 Proceedings of the Second International Symposium on Foundations of Information and Knowledge Systems
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Controlled Query Evaluation for Known Policies by Combining Lying and Refusal
Annals of Mathematics and Artificial Intelligence
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
IEEE Transactions on Dependable and Secure Computing
On logical foundations of multilevel secure databases
Journal of Intelligent Information Systems - Special issue: Database and applications security
Safety in automated trust negotiation
ACM Transactions on Information and System Security (TISSEC)
An epistemic framework for privacy protection in database linking
Data & Knowledge Engineering
Controlled query evaluation with open queries for a decidable relational submodel
Annals of Mathematics and Artificial Intelligence
Reducing inference control to access control for normalized database schemas
Information Processing Letters
Controlled Query Evaluation and Inference-Free View Updates
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Semantics-aware security policy specification for the semantic web data
International Journal of Information and Computer Security
A formal model of data privacy
PSI'06 Proceedings of the 6th international Andrei Ershov memorial conference on Perspectives of systems informatics
Confidentiality policies for controlled query evaluation
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Granulation as a privacy protection mechanism
Transactions on rough sets VII
Requirements and protocols for inference-proof interactions in information systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Efficient inference control for open relational queries
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Privacy policies with modal logic: the dynamic turn
DEON'10 Proceedings of the 10th international conference on Deontic logic in computer science
JELIA'10 Proceedings of the 12th European conference on Logics in artificial intelligence
Opacity analysis in trust management systems
ISC'11 Proceedings of the 14th international conference on Information security
The relationship between reasoning about privacy and default logics
LPAR'05 Proceedings of the 12th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
Controlled query evaluation with open queries for a decidable relational submodel
FoIKS'06 Proceedings of the 4th international conference on Foundations of Information and Knowledge Systems
DNIS'10 Proceedings of the 6th international conference on Databases in Networked Information Systems
Towards controlled query evaluation for incomplete first-order databases
FoIKS'10 Proceedings of the 6th international conference on Foundations of Information and Knowledge Systems
Anonymity preserving techniques in trust negotiations
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Inference-usability confinement by maintaining inference-proof views of an information system
International Journal of Computational Science and Engineering
Dishonest reasoning by abduction
IJCAI'11 Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Volume Two
A dynamic logic for privacy compliance
Artificial Intelligence and Law - Special issue on Deontic Logic and Normative Systems
Privacy preservation using multi-context systems and default logic
Correct Reasoning
Enforcing confidentiality in relational databases by reducing inference control to access control
ISC'07 Proceedings of the 10th international conference on Information Security
Information flow in trust management systems
Journal of Computer Security - CSF 2010
Hi-index | 0.00 |
In this paper, we develop a formal logical foundation for secure deductive databases. This logical foundation is based on an extended logic involving several modal operators. We develop two models of interaction between the user and the database called 驴yes-no驴 dialogs, and 驴yes-no-don驴t know驴 dialogs. Both dialog frameworks allow the database to lie to the user. We develop an algorithm for answering queries using yes-no dialogs and prove that secure query processing using yes-no dialogs is NP-complete. Consequently, the degree of computational intractability of query processing with yes-no dialogs is no worse than for ordinary databases. Furthermore, the algorithm is maximally cooperative to user in the sense that lying is resorted to only when absolutely necessary. For Horn databases, we show that secure query processing can be achieved in linear time - hence, this is no more intractable than the situation in ordinary databases. Finally, we identify necessary and sufficient conditions for the database to be able to preserve security. Similar results are also obtained for yes-no-don驴t know dialogs.