2002
DOI: 10.1006/jcss.2001.1807
|View full text |Cite
|
Sign up to set email alerts
|

Maximizing Sharing of Protected Information

Abstract: Despite advances in recent years in the area of mandatory access control in database systems, today's information repositories remain vulnerable to inference and data association attacks that can result in serious information leakage. Without support for coping against these attacks, sensitive information can be put at risk because of release of other (less sensitive) related information. The ability to protect information diclosure against such improper leakage would be of great benefit to governmental, publi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…Our work may bring some resemblance with the work of classifying information while maximizing visibility [Dawson et al 2002]. However, while the two lines of work share the goal of ensuring protection and minimizing security measures enforcement, the consideration of fragmentation and encryption on the one side and security labeling on the other make the problems considerably different.…”
Section: Related Workmentioning
confidence: 93%
“…Our work may bring some resemblance with the work of classifying information while maximizing visibility [Dawson et al 2002]. However, while the two lines of work share the goal of ensuring protection and minimizing security measures enforcement, the consideration of fragmentation and encryption on the one side and security labeling on the other make the problems considerably different.…”
Section: Related Workmentioning
confidence: 93%
“…Function Re_Assign receives as input the set To_Empty of non-empty but underquota groups, and tries to reallocate their tuples to other groups (lines [30][31][32][33][34][35][36][37][38]. Tuples in under-quota groups that cannot be reallocated will be removed from the fragmentation and are inserted into To_Remove (lines [39][40].…”
Section: Computing a K-loose Associationmentioning
confidence: 99%
“…Data dependencies can cause inference channels to arise, allowing a recipient to either precisely determine, or reduce the uncertainty about, the values of sensitive, not released, information that is somehow dependent on the released one. This problem has been under the attention of researchers for decades and has been analyzed from different perspectives, resulting in a large body of research that includes: statistical databases and statistical data publications (e.g., [1]); multilevel database systems with the problem of establishing proper classification of data, capturing data relationships and corresponding inference channels (e.g., [35,66]); ensuring privacy of respondents' identities or of their sensitive information when publishing macro or micro data (e.g., [24,25]); protection of sensitive data associations due to data mining (e.g., [2]). Several approaches have been proposed addressing all these aspects, and offering solutions to block or limit the exposure of sensitive or private information.…”
Section: Introductionmentioning
confidence: 99%
“…The work presented in this paper has some affinity with the work in [17]. Although this approach shares with our problem the common goal of enforcing confidentiality constraints on data, it is concerned with retrieving a data classification (according 564 V. Ciriani et al / Selective data outsourcing for enforcing privacy to a multilevel mandatory policy) that ensures sensitive information is not disclosed.…”
Section: Related Workmentioning
confidence: 99%