2013
DOI: 10.1007/978-3-642-37134-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Logic-Oriented Confidentiality Policies for Controlled Interaction Execution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…Finally, if such a minimum does not exists as for [2, 3] ⊕ [4,6] we define [0, 6] as the result. Now, we consider that the mediator should compute the sum of the columns D and E in the individual's row.…”
Section: Further Challenges and Solutions For The Java-based Instanti...mentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, if such a minimum does not exists as for [2, 3] ⊕ [4,6] we define [0, 6] as the result. Now, we consider that the mediator should compute the sum of the columns D and E in the individual's row.…”
Section: Further Challenges and Solutions For The Java-based Instanti...mentioning
confidence: 99%
“…This loss of information in the result sent to the partner does not occur when computing the sum with program p 2 . In line 4 of program p 2 , the CIECensor select the subtree with root [4,6] for SC 2 , so that it returns the value 3 of x 3 , the sum of attributes D and E, unmodified.…”
Section: Further Challenges and Solutions For The Java-based Instanti...mentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, we want to apply a suitable variant of CIE-like semantics of a security policy for the overall system, see [5]. Informally expressed, the wanted semantics basically requires the following for each belief sentence (traditionally called a potential secret) in the security policy for a specific cooperation partner:…”
Section: Inference Controlmentioning
confidence: 99%
“…Elaborating seminal proposals for inference control in information systems, and being in the spirit of many similar approaches to secrecy as concisely exposed in [14], previous work on Controlled Interaction Execution, CIE, originally only dealt with a single owner of a logic-oriented database system like a relational one solely employed for querying, and later also included updates and non-monotonic belief management, see the summaries [4,5], and the abstraction [6]. Based on that, and grossly summarized, in our vision [7] we proposed an architecture of an inference control front-end for uniformly shielding a possibly heterogeneous collection of data sources.…”
Section: Introductionmentioning
confidence: 99%