2011
DOI: 10.1007/978-3-642-22348-8_10
|View full text |Cite
|
Sign up to set email alerts
|

History-Dependent Inference Control of Queries by Dynamic Policy Adaption

Abstract: Abstract. Policy-based inference control of queries submitted to a logicoriented information system requires us to consider the history of queries and answers to a particular user. In most previous approaches, the control system captures the history by maintaining a fictitious view the user is supposed to generate by exploiting rational reasoning. In this paper, we propose and explore an alternative option to represent the history, namely by suitably adapting the confidentiality policy after returning an answe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 10 publications
(5 reference statements)
0
5
0
Order By: Relevance
“…Inference Threat: In [7,13,6], when a user is about to infer some information, the system prevents it by either denying access or providing scrambled data. In contrast, we assume that real organizations may need to provide access to roles to a single employee even if they allow inference.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Inference Threat: In [7,13,6], when a user is about to infer some information, the system prevents it by either denying access or providing scrambled data. In contrast, we assume that real organizations may need to provide access to roles to a single employee even if they allow inference.…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…This threat occurs when through what seems to be innocuous information, a user is capable of inferring information that should not be accessible. In existing approaches to deal with inference threat, [12], when the user is about to conclude some unauthorized information, the system prevents it by denying access or providing scrambled data. This is only adequate for some types of organizations.…”
Section: Commercial Toolsmentioning
confidence: 99%
“…In the literature of controlled query evaluation [Biskup 2011;Biskup and Weibert 2008;Biskup et al 2010Biskup and Tadros 2012], a secret is preserved if for any sequence of queries there are two different models that are indistinguishable in the sense that they produce the same answers to the queries; one being a model of the secret and the other a model of the negation of the secret. Our framework also respects this property of secrecy-preservation.…”
Section: Remark Regarding the Relationship Between Cqe And Our Msq Symentioning
confidence: 99%