2009
DOI: 10.1007/978-3-642-04444-1_18
|View full text |Cite
|
Sign up to set email alerts
|

Requirements and Protocols for Inference-Proof Interactions in Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Clearly, such refreshments are also useful when the server requests an update of the instance by himself, as further studied in [9]. Additionally, we could combine updates requested by the server and view updates issued by a client.…”
Section: Conclusion and Related Workmentioning
confidence: 96%
“…Clearly, such refreshments are also useful when the server requests an update of the instance by himself, as further studied in [9]. Additionally, we could combine updates requested by the server and view updates issued by a client.…”
Section: Conclusion and Related Workmentioning
confidence: 96%
“…The controlled query evaluation (CQE) framework first introduced by Sicherman et al [19] offers a mechanism for answering database queries without revealing secrets. This framework which has been explored extensively by Biskup and colleagues in a series of papers [85,86,87,88,89,90,91,92,93,94,95,96] includes: (a) policies that specify secrets (queries for which all possible answers must be protected), potential secrets (queries for which only some of the answers must be protected); (b) policies for answering queries so as to protect secrets and potential secrets including lying in response to a query, refusing to answer a query, and their combinations; and (c) alternative assumptions regarding whether or not the querying agent is aware of the queries whose answers the KB is trying to protect. Recent work within this framework has introduced techniques using SAT-solvers and constraint solvers for preprocessing the databases so that the resulting database can answer queries in a manner that is consistent with the specified policies.…”
Section: Related Workmentioning
confidence: 99%