{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:16:09Z","timestamp":1725560169843},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540286608"},{"type":"electronic","value":"9783540318248"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11548706_59","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T14:13:06Z","timestamp":1127830386000},"page":"558-567","source":"Crossref","is-referenced-by-count":1,"title":["A Scheme for Inference Problems Using Rough Sets and Entropy"],"prefix":"10.1007","author":[{"given":"X.","family":"Chen","sequence":"first","affiliation":[]},{"given":"R.","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"59_CR1","first-page":"311","volume-title":"Database Security III: Status and Prospects","author":"L. Buczkowski","year":"1990","unstructured":"Buczkowski, L.: Database inference controller. In: Database Security III: Status and Prospects, pp. 311\u2013322. North-Holland, Amsterdam (1990)"},{"key":"59_CR2","doi-asserted-by":"crossref","unstructured":"Chang, L., Moskowitz, I.: Parsimonious downgrading and decision trees applied to the inference problem. In: Proc. New Security Paradigms Workshop (1998)","DOI":"10.1145\/310889.310921"},{"key":"59_CR3","unstructured":"Chang, L., Moskowitz, I.: A Bayesian network schema for lessoning database inference. In: International Conference on Computational Intelligence for Modeling, Control and Automation, Las Vegas (July 2001)"},{"key":"59_CR4","doi-asserted-by":"crossref","unstructured":"Chen, X., Wei, R.: A Dynamic method for handling the inference problem in multilevel secure databases. In: Proc. ITCC 2005, pp. 751\u2013756 (2005)","DOI":"10.1109\/ITCC.2005.7"},{"key":"59_CR5","doi-asserted-by":"crossref","unstructured":"Denning, D.: Commutative filters for reducing inference threats in multilevel database systems. In: Proc. IEEE Symposium on Security and Privacy, pp. 134\u2013146 (1985)","DOI":"10.1109\/SP.1985.10017"},{"key":"59_CR6","doi-asserted-by":"crossref","unstructured":"Goguen, J., Meseguer, J.: Unwinding and inference control. In: Proc. IEEE Symposium on Security and Privacy, pp. 75\u201386 (1984)","DOI":"10.1109\/SP.1984.10019"},{"key":"59_CR7","doi-asserted-by":"crossref","unstructured":"Hinke, T.: Inference aggregation detection in database management systems. In: Proc. IEEE Symposium on Security and Privacy, pp. 96\u2013106 (1988)","DOI":"10.1109\/SECPRI.1988.8101"},{"issue":"2,3","key":"59_CR8","doi-asserted-by":"crossref","first-page":"147","DOI":"10.3233\/JCS-1994\/1995-32-304","volume":"3","author":"T.H. Hinke","year":"1995","unstructured":"Hinke, T.H., Delugach, H.S., Changdrasekhar, A.: A fast algorithm for detecting second paths in database inference analysis. Jour. of Computer Security\u00a03(2,3), 147\u2013168 (1995)","journal-title":"Jour. of Computer Security"},{"key":"59_CR9","doi-asserted-by":"crossref","unstructured":"Hale, J., Shenoi, S.: Catalytic inference analysis: detecting inference threats due to knowledge discovery. In: IEEE Symposium on Security and Privacy, pp. 188\u2013199 (1997)","DOI":"10.1109\/SECPRI.1997.601333"},{"issue":"3","key":"59_CR10","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/2.16229","volume":"22","author":"T. Keef","year":"1989","unstructured":"Keef, T., Thuraisingham, M., Tsai, W.: Secure query processing strategies. IEEE Computer\u00a022(3), 63\u201370 (1989)","journal-title":"IEEE Computer"},{"key":"59_CR11","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Marks, T.H., Thuraisingham, B.: Security and data mining. In: Database Security Vol. 9: Status ans Prospects, pp. 391\u2013399 (1996)","DOI":"10.1007\/978-0-387-34932-9_25"},{"key":"59_CR12","doi-asserted-by":"crossref","unstructured":"Morgenstern, M.: Controlling logical inference in multilevel database systems. In: Proc. IEEE Symposium on Security and Privacy, pp. 245\u2013255 (1988)","DOI":"10.1109\/SECPRI.1988.8116"},{"issue":"1","key":"59_CR13","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/69.485628","volume":"8","author":"D. Marks","year":"1996","unstructured":"Marks, D.: Inference in MLS databse systems. IEEE Trans. Knowledge and Data Eng.\u00a08(1), 46\u201355 (1996)","journal-title":"IEEE Trans. Knowledge and Data Eng."},{"key":"59_CR14","doi-asserted-by":"crossref","unstructured":"Marks, D., Motro, A., Jajodia, S.: Enhancing the controlled disclosure of sensitive information. In: Proc. European Symposium on Research in Computer Security (1996)","DOI":"10.1007\/3-540-61770-1_42"},{"key":"59_CR15","doi-asserted-by":"crossref","unstructured":"Mazumdar, S., Stemple, D., Sheard, T.: Resolving the tension between integrity and security using a theorem prover. In: Proc. ACM Int\u2019l Conference on Management of Data, pp. 233\u2013242 (1998)","DOI":"10.1145\/971701.50231"},{"key":"59_CR16","volume-title":"Rough sets: theoretical aspects of reasoning about data","author":"Z. Pawlak","year":"1992","unstructured":"Pawlak, Z.: Rough sets: theoretical aspects of reasoning about data. Kluwer Academic Publishers, Dordrecht (1992)"},{"key":"59_CR17","volume-title":"Coding and information theory","author":"S. Roman","year":"1992","unstructured":"Roman, S.: Coding and information theory. Springer, Heidelberg (1992)"},{"key":"59_CR18","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"C. Shannon","year":"1948","unstructured":"Shannon, C.: A mathematical theory of communication. Bell System Technical Journal\u00a027, 379\u2013423, 623-656 (1948)","journal-title":"Bell System Technical Journal"},{"key":"59_CR19","doi-asserted-by":"crossref","unstructured":"Smith, G.: Modeling security-relevant data semantics. In: Proc. IEEE Symposium on Research in Security and Privacy, pp. 384\u2013391 (1990)","DOI":"10.1109\/RISP.1990.63866"},{"key":"59_CR20","doi-asserted-by":"crossref","unstructured":"Stickel, M.: Elimination of inference channels by optimal upgrading. In: Proc. IEEE Symposium on Research in Security and Privacy, pp. 168\u2013174 (1994)","DOI":"10.1109\/RISP.1994.296583"},{"key":"59_CR21","doi-asserted-by":"crossref","unstructured":"Staddon, J.: Dynamic inference control. In: DMKD 2003: 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (2003)","DOI":"10.1145\/882082.882103"},{"issue":"4","key":"59_CR22","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/69.109108","volume":"3","author":"T. Su","year":"1991","unstructured":"Su, T., Ozsoyoglu, G.: Inference in MLS database systems. IEEE Trans. Knowledge and Data Eng.\u00a03(4), 474\u2013485 (1991)","journal-title":"IEEE Trans. Knowledge and Data Eng."},{"issue":"2","key":"59_CR23","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/69.54719","volume":"2","author":"P. Stachour","year":"1990","unstructured":"Stachour, P., Thuraisingham, B.: Design of LDV: A multilevel secure relational database management system. IEEE Trans. Knowledge and Data Eng.\u00a02(2), 190\u2013209 (1990)","journal-title":"IEEE Trans. Knowledge and Data Eng."},{"key":"59_CR24","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/0167-4048(87)90029-0","volume":"6","author":"B. Thuraisingham","year":"1987","unstructured":"Thuraisingham, B.: Security checking in relational database management systems augmented with inference engines. Computers ans Security\u00a06, 479\u2013492 (1987)","journal-title":"Computers ans Security"},{"key":"59_CR25","doi-asserted-by":"crossref","unstructured":"Thuraisingham, B.: Towards the design of a secure data\/knowledge base management system. Data knowledge and engineering (1990)","DOI":"10.1016\/0169-023X(90)90033-A"},{"key":"59_CR26","doi-asserted-by":"crossref","unstructured":"Yip, R., Levitt, K.: Data level inference detection in database systems. In: IEEE Eleventh Computer Security Foundations Workshop (1998)","DOI":"10.1109\/CSFW.1998.683168"}],"container-title":["Lecture Notes in Computer Science","Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11548706_59.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:41:07Z","timestamp":1605642067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11548706_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540286608","9783540318248"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11548706_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}