skip to main content
article
Free Access

Secure databases: protection against user influence

Published:01 March 1979Publication History
Skip Abstract Section

Abstract

Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.

References

  1. 1 CODD, E.F. A relational model of data for large and shared data banks. Comm ACM 13, 6 (June 1970}, 377-387. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 DEMILLO, R., DOBKIN, D., ANt) LIPTON, R. Even data bases that lie can be compromised. IEEE Trans. Software Eng. SE-4, 1 (1978), 73-75.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 DENNING, D.E. A lattice model of secure information flow. Comm. ACM 19, 5 (May 1976), 236-243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 FENTON, J.S. Memoryless subsystems. Comptr. J. 17, 2 (1974), 143-147.Google ScholarGoogle ScholarCross RefCross Ref
  5. 5 GaAHAM, G.S., AND DENNING, P.J. Protection--principles and practice. Proc. AFIPS I972 SJCC, Vol. 40, AFIPS Press, Montvale, N.J., pp. 417-429. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 HAQ, M. Insuring individuals' privacy from statistical data base users. Proc. AFIPS 1975 NCC, Vol. 43, AFIPS Press, Montvale, N.J., pp. 941-946.Google ScholarGoogle Scholar
  7. 7 HOFFMAN, L.J., AND MILLER, W.F. Getting a personal dossier from a statistical data bank. Datamation 16, 5 (May I970}, 74-75.Google ScholarGoogle Scholar
  8. 8 JONES, A.K., AND LIPTON, R.J. The enforcement of security policies for computation. Proc. 5th Syrup. Oper. Syst. Principles. Oper. SysL Rev. (ACM) 9, 5 (1975), 197-206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 JONES, A.K., AND WULF, W.A. Towards the design of secure systems. Software--Practices and Experience 5, 4 (Oct. 1975), 321-336.Google ScholarGoogle Scholar
  10. 10 LAMPSON, B.W. Protection. Proc. 5th Princeton Symp. Inform. Sci. and Syst., 1971, pp. 437-443.Google ScholarGoogle Scholar
  11. 11 ORGANICK, E.I. The MULTICS System: An Examination of Its Structure. M.I.T. Press, Cambridge, Mass., 1972. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12 WULF, W.A., ET AL. HYDRA: The kernel of a multiprocessor system. Comm. ACM 17, 6 (June 1974), 337-345. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure databases: protection against user influence

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader