1989
DOI: 10.1109/2.16229
|View full text |Cite
|
Sign up to set email alerts
|

Secure query-processing strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2002
2002
2006
2006

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…This is a well-known problem in group communication that much work has gone into remedying (see, for example, [10]) yet it is a desirable property of an inference control scheme (what we call crowd control). As mentioned in Section 1, an alternative approach to inference control that can be viewed as fitting in our general framework is to maintain a bit for each object indicating whether or not it has been released as the result of a query (see, for example, [9]). Our approach allows for more accurate access control because we can distinguish between n users each accessing m − 1 objects in an inference channel of length m, and n(m−1) users each accessing a single object in the channel.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This is a well-known problem in group communication that much work has gone into remedying (see, for example, [10]) yet it is a desirable property of an inference control scheme (what we call crowd control). As mentioned in Section 1, an alternative approach to inference control that can be viewed as fitting in our general framework is to maintain a bit for each object indicating whether or not it has been released as the result of a query (see, for example, [9]). Our approach allows for more accurate access control because we can distinguish between n users each accessing m − 1 objects in an inference channel of length m, and n(m−1) users each accessing a single object in the channel.…”
Section: Related Workmentioning
confidence: 99%
“…When a user makes a query it is checked against the user's query history and all known inference channels, before granting access to the results of the query. More sophisticated methods of query-time inference control use inference engines to determine access [9]. However, since query histories can be quite long, this approach can result in slow query processing.…”
Section: Introductionmentioning
confidence: 98%
“…Detecting and preventing the disclosure of sensitive data via inference channels is referred to as the inference problem [9]. Solutions to the inference problem can be categorized as either a database design [2,3,7,8,11,14,15,17,18,21] or a query processing [4,10,12,13,16,19] solution.…”
Section: Introductionmentioning
confidence: 99%
“…Tools and techniques for ensuring inference control without user privacy can be found in [43,32,47].…”
Section: Related Workmentioning
confidence: 99%