2007
DOI: 10.1007/978-3-540-73538-0_1
|View full text |Cite
|
Sign up to set email alerts
|

Confidentiality Policies for Controlled Query Evaluation

Abstract: Abstract. Controlled Query Evaluation (CQE) is an approach to enforcing confidentiality in information systems at runtime. At each query, a censor checks whether the answer to that query would enable the user to infer any information he is not allowed to know according to some specified confidentiality policy. If this is the case, the answer is distorted, either by refusing to answer or by returning a modified answer. In this paper, we consider incomplete logic databases and investigate the semantic ways of pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2007
2007
2016
2016

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…We can reduce confidentiality targets to potential secrets, and reuse the enforcement methods from the present paper. Details are given in [7]. Previous work on complete databases also investigated the special case that the user is not aware of the contents of the confidentiality policy ("unknown policies" [1,17]).…”
Section: Conclusion and Further Workmentioning
confidence: 98%
See 2 more Smart Citations
“…We can reduce confidentiality targets to potential secrets, and reuse the enforcement methods from the present paper. Details are given in [7]. Previous work on complete databases also investigated the special case that the user is not aware of the contents of the confidentiality policy ("unknown policies" [1,17]).…”
Section: Conclusion and Further Workmentioning
confidence: 98%
“…-The uniform refusal method relies on meta inferences, calculated by inference meta (7). Thus, also disjunctive inferences have to be considered when determining the security configuration.…”
Section: Combined Lying and Refusalmentioning
confidence: 99%
See 1 more Smart Citation
“…A similar pattern based policy definition is complemented with precise default semantics and access conflict resolution in [15].Postfiltering query results to enforce the access control policy is also possible [6] but this strategy may have performance issues without dedicated support.…”
Section: Related Workmentioning
confidence: 99%
“…Data privacy and access control in incomplete propositional databases has been studied in [6], [7], [31]. They take a different approach, control query evaluation (CQE), to fine-grained access control.…”
Section: Related Workmentioning
confidence: 99%