2004
DOI: 10.1007/978-3-540-30570-5_18
|View full text |Cite
|
Sign up to set email alerts
|

Authorization Views and Conditional Query Containment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
90
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 35 publications
(91 citation statements)
references
References 15 publications
1
90
0
Order By: Relevance
“…The definition is further based on the notion of certain answers [3]. We note that instance-specific reasoning also arises in data security and authorization views: in that context, Zhang and Mendelzon study conditional query containment, where containment is conditioned on a particular view output [32].…”
Section: Related Workmentioning
confidence: 99%
“…The definition is further based on the notion of certain answers [3]. We note that instance-specific reasoning also arises in data security and authorization views: in that context, Zhang and Mendelzon study conditional query containment, where containment is conditioned on a particular view output [32].…”
Section: Related Workmentioning
confidence: 99%
“…The conditions of perfect secrecy are studied in [22,8] using probability model, and in [28] using query conditional containment. In this paper, we addressed the case where we intend to release data if some partial disclosure by database views is tolerated, and hence the disclosure needs to be measured.…”
Section: Related Workmentioning
confidence: 99%
“…For the Non-Truman model, Rizvi et al [16] left open the decidability of the conditional validity problem. Although Zhang et al [20] proved that it is decidable for conjunctive queries and Koutris et al [11] extended this result to unions of conjunctive queries, there is no general characterization of the problem. For the Truman model, Wang et al [19] claimed that "while the maximality property is desirable, it is difficult to achieve" for algorithms that are secure and sound.…”
Section: Introductionmentioning
confidence: 99%
“…By using the resulting criteria and by exploiting the connections between optimal algorithms in the two models, we extend our decidability results to optimal algorithms in the Non-Truman model and to the conditional validity problem. Note that we consider a security model that is more expressive than the one used in previous work on the Non-Truman model [11,16,20]. We thereby improve upon the results in [11,20].…”
Section: Introductionmentioning
confidence: 99%