2014
DOI: 10.1007/978-3-319-11212-1_10
|View full text |Cite
|
Sign up to set email alerts
|

Optimality and Complexity of Inference-Proof Data Filtering and CQE

Abstract: The ample literature on confidentiality-preserving data publishing -and controlled query evaluation (CQE) in particular -leaves several questions open. Are the greedy data-filtering algorithms adopted in the literature maximally cooperative? Can novel secure view formats or answer distortion methods improve security or cooperativeness? What is the inherent complexity of confidentiality-preserving data publishing under different constraints, such as cooperativeness and availability? Can the theoretical results … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…Such queries, here called basic information requests, are the only way how the program may get data from the abstract information state. Moreover, the information owner declares a partner-specific confidentiality policy pol as sets of abstract information states, as described in [7].…”
Section: Overview On the Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…Such queries, here called basic information requests, are the only way how the program may get data from the abstract information state. Moreover, the information owner declares a partner-specific confidentiality policy pol as sets of abstract information states, as described in [7].…”
Section: Overview On the Frameworkmentioning
confidence: 99%
“…[25], and inference-usability confinement with dynamic tracking of information flows from the abstract information state to generated message data sent to the partner and with a filter and modification method that employs generalization of declassified values, e.g. [5,6,7].…”
Section: Introductionmentioning
confidence: 99%
“…More specifically, these temporary views are initialized when storing a basic belief reaction as an object in a local container and for an evaluation further tracked according to the operators in the code annotation. In abstract terms, such an information content is represented as a mapping of possible values to sets of belief states such that all these sets together form a partition of the possible belief states, similarly as in [6]. Moreover, the mapping is complemented with an identification of the actual value and block, respectively.…”
Section: Need Of Local Flow Trackingmentioning
confidence: 99%
“…Called by the FlowTracker with the tentative addition, the CIECensor checks whether the combined information content of the tentative addition resulting from preceding processing and the previous view resulting from the history could possibly violate the security policy. In abstract terms, this combination is obtained by taking all nonempty intersections of a block in (the partition of) the tentative addition with the previous view, and a possible violation occurs if there is a block in the combination that is completely contained in an element of the security policy, assuming that a policy element is abstractly represented as a set of belief states, as described in [6]. If the check confirms harmlessness, the previous view is updated to its intersection with the actual block and the FlowTracker is informed accordingly, and the FlowTracker then temporarily opens the flow lock in turn.…”
Section: Need Of Local Flow Trackingmentioning
confidence: 99%
See 1 more Smart Citation