1995
DOI: 10.3233/jcs-1994/1995-32-304
|View full text |Cite
|
Sign up to set email alerts
|

A Fast Algorithm for Detecting Second Paths in Database Inference Analysis*

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

1996
1996
2009
2009

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…Techniques to detect privacy violations via inference channels in MLS relational databases fall into two general categories. The first category includes techniques that detect inference channels during database design time [12,26,27,34,35,43,46,48,60,63,66]. Inference channels are typically removed by modifying the database design and/or by increasing the classification levels of some of the data items.…”
Section: Related Workmentioning
confidence: 99%
“…Techniques to detect privacy violations via inference channels in MLS relational databases fall into two general categories. The first category includes techniques that detect inference channels during database design time [12,26,27,34,35,43,46,48,60,63,66]. Inference channels are typically removed by modifying the database design and/or by increasing the classification levels of some of the data items.…”
Section: Related Workmentioning
confidence: 99%
“…They considered computing intersection, intersection size, equijoin and equijoin size, assuming that certain metadata such as the cardinality of databases can be shared to both parties. Besides, there exists an extensive literature on inference control in multilevel secure databases [9,15,14,13,19]. All these works prohibit the sharing of databases.…”
Section: Related Workmentioning
confidence: 99%
“…Techniques to detect and remove inference channels can be organized into two categories: The first category includes techniques that detect inference channels during database design; any channels are removed by modifying the database design and/or by increasing the classification levels of some of the data items [2], [6], [7], [12], [17], [9], [13], [14], [16], [3], [4]. These techniques often result in overclassification of data and, therefore, reduce the availability of data.…”
Section: Related Work and Their Limitationsmentioning
confidence: 99%