Abstract
Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.
- 1 CODD, E.F. A relational model of data for large and shared data banks. Comm ACM 13, 6 (June 1970}, 377-387. Google ScholarDigital Library
- 2 DEMILLO, R., DOBKIN, D., ANt) LIPTON, R. Even data bases that lie can be compromised. IEEE Trans. Software Eng. SE-4, 1 (1978), 73-75.Google ScholarDigital Library
- 3 DENNING, D.E. A lattice model of secure information flow. Comm. ACM 19, 5 (May 1976), 236-243. Google ScholarDigital Library
- 4 FENTON, J.S. Memoryless subsystems. Comptr. J. 17, 2 (1974), 143-147.Google ScholarCross Ref
- 5 GaAHAM, G.S., AND DENNING, P.J. Protection--principles and practice. Proc. AFIPS I972 SJCC, Vol. 40, AFIPS Press, Montvale, N.J., pp. 417-429. Google ScholarDigital Library
- 6 HAQ, M. Insuring individuals' privacy from statistical data base users. Proc. AFIPS 1975 NCC, Vol. 43, AFIPS Press, Montvale, N.J., pp. 941-946.Google Scholar
- 7 HOFFMAN, L.J., AND MILLER, W.F. Getting a personal dossier from a statistical data bank. Datamation 16, 5 (May I970}, 74-75.Google Scholar
- 8 JONES, A.K., AND LIPTON, R.J. The enforcement of security policies for computation. Proc. 5th Syrup. Oper. Syst. Principles. Oper. SysL Rev. (ACM) 9, 5 (1975), 197-206. Google ScholarDigital Library
- 9 JONES, A.K., AND WULF, W.A. Towards the design of secure systems. Software--Practices and Experience 5, 4 (Oct. 1975), 321-336.Google Scholar
- 10 LAMPSON, B.W. Protection. Proc. 5th Princeton Symp. Inform. Sci. and Syst., 1971, pp. 437-443.Google Scholar
- 11 ORGANICK, E.I. The MULTICS System: An Examination of Its Structure. M.I.T. Press, Cambridge, Mass., 1972. Google ScholarDigital Library
- 12 WULF, W.A., ET AL. HYDRA: The kernel of a multiprocessor system. Comm. ACM 17, 6 (June 1974), 337-345. Google ScholarDigital Library
Index Terms
- Secure databases: protection against user influence
Recommendations
Database Security
Databases may be compromised by asking a set of queries which return only statistical information and making inferences about a specific entry from the results of the set of queries. We present methods of constructing the set of queries to compromise a ...
Compromising statistical databases responding to queries about means
This paper describes how to compromise a statistical database which only answers queries about arithmetic means for query sets whose cardinality falls in the range [k, N - k], for some k > 0, where N ≥ 2k is the number of records in the database. The ...
Mitigation of malicious modifications by insiders in databases
ICISS'11: Proceedings of the 7th international conference on Information Systems SecurityInsider threat is considered as a serious issue in all organizations. Sophisticated insiders can override threat prevention tools and carry on their attacks with new techniques. One such technique which remains to be an advantage for insiders to attack ...
Comments