{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:21:34Z","timestamp":1742386894471},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540287988"},{"type":"electronic","value":"9783540319740"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11552338_9","type":"book-chapter","created":{"date-parts":[[2005,11,11]],"date-time":"2005-11-11T13:17:57Z","timestamp":1131715077000},"page":"124-142","source":"Crossref","is-referenced-by-count":4,"title":["Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution"],"prefix":"10.1007","author":[{"given":"Tyrone S.","family":"Toland","sequence":"first","affiliation":[]},{"given":"Csilla","family":"Farkas","sequence":"additional","affiliation":[]},{"given":"Caroline M.","family":"Eastman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels, and monitoring disclosure. IEEE Trans. Knowledge and Data Eng. (November 2000)","key":"9_CR1","DOI":"10.1109\/69.895801"},{"key":"9_CR2","first-page":"311","volume-title":"Database Security III: Status and Prospects","author":"L.J. Buczkowski","year":"1990","unstructured":"Buczkowski, L.J.: Database inference controller. In: Spooner, D.L., Landwehr, C. (eds.) Database Security III: Status and Prospects, pp. 311\u2013322. North-Holland, Amsterdam (1990)"},{"doi-asserted-by":"crossref","unstructured":"Dawson, S., De di Capitani Vimercati, S., Samarati, P.: Specification and enforcement of classification and inference constraints. In: Proc. of the 20th IEEE Symposium on Security and Privacy, Oakland, CA, May 9\u201312 (1999)","key":"9_CR3","DOI":"10.1109\/SECPRI.1999.766913"},{"doi-asserted-by":"crossref","unstructured":"Denning, D.E.: Commutative filters for reducing inference threats in multilevel database systems. In: Proc. IEEE Symp. on Security and Privacy, pp. 134\u2013146 (1985)","key":"9_CR4","DOI":"10.1109\/SP.1985.10017"},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C. Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: a survey. SIGKDD Explor. Newsl.\u00a04(2), 6\u201311 (2002)","journal-title":"SIGKDD Explor. Newsl."},{"unstructured":"Farkas, C., Toland, T., Eastman, C.: The inference problem and updates in relational databases. In: Proc. IFIP WG11.3 Working Conference on Database and Application Security, July 15-18, pp. 171\u2013186 (2001)","key":"9_CR6"},{"doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: Proc. IEEE Symp. on Security and Privacy, pp. 75\u201386 (1984)","key":"9_CR7","DOI":"10.1109\/SP.1984.10019"},{"doi-asserted-by":"crossref","unstructured":"Hinke, T.H.: Inference aggregation detection in database management systems. In: Proc. IEEE Symp. on Security and Privacy, pp. 96\u2013106 (1988)","key":"9_CR8","DOI":"10.1109\/SECPRI.1988.8101"},{"key":"9_CR9","first-page":"570","volume-title":"Information Security: An integrated collection of essays","author":"S. Jajodia","year":"1995","unstructured":"Jajodia, S., Meadows, C.: Inference problems in multilevel secure database management systems. In: Abrams, M.D., Jajodia, S., Podell, H. (eds.) Information Security: An integrated collection of essays, pp. 570\u2013584. IEEE Computer Society Press, Los Alamitos (1995)"},{"doi-asserted-by":"crossref","unstructured":"Keefe, T.F., Thuraisingham, M.B., Tsai, W.T.: Secure query-processing strategies. IEEE Computer, 63\u201370 (March 1989)","key":"9_CR10","DOI":"10.1109\/2.16229"},{"issue":"1","key":"9_CR11","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/69.485628","volume":"8","author":"D.G. Marks","year":"1996","unstructured":"Marks, D.G.: Inference in MLS database systems. IEEE Trans. Knowledge and Data Eng.\u00a08(1), 46\u201355 (1996)","journal-title":"IEEE Trans. Knowledge and Data Eng."},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/3-540-61770-1_42","volume-title":"Computer Security - ESORICS 96","author":"D.G. Marks","year":"1996","unstructured":"Marks, D.G., Motro, A., Jajodia, S.: Enhancing the controlled disclosure of sensitive information. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 290\u2013303. Springer, Heidelberg (1996)"},{"doi-asserted-by":"crossref","unstructured":"Mazumdar, S., Stemple, D., Sheard, T.: Resolving the tension between integrity and security using a theorem prover. In: Proc. ACM Int\u2019l Conf. Management of Data, pp. 233\u2013242 (1988)","key":"9_CR13","DOI":"10.1145\/50202.50231"},{"doi-asserted-by":"crossref","unstructured":"Morgenstern, M.: Controlling logical inference in multilevel database systems. In: Proc. IEEE Symp. on Security and Privacy, pp. 245\u2013255 (1988)","key":"9_CR14","DOI":"10.1109\/SECPRI.1988.8116"},{"doi-asserted-by":"crossref","unstructured":"Smith, G.W.: Modeling security-relevant data semantics. In: Proc. IEEE Symp. Research in Security and Privacy, pp. 384\u2013391 (1990)","key":"9_CR15","DOI":"10.1109\/RISP.1990.63866"},{"issue":"2","key":"9_CR16","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1109\/69.54719","volume":"2","author":"P.D. Stachour","year":"1990","unstructured":"Stachour, P.D., Thuraisingham, B.: Design of LDV: A multilevel secure relational database management system. IEEE Trans. Knowledge and Data Eng.\u00a02(2), 190\u2013209 (1990)","journal-title":"IEEE Trans. Knowledge and Data Eng."},{"issue":"4","key":"9_CR17","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/69.109108","volume":"3","author":"T. Su","year":"1991","unstructured":"Su, T., Ozsoyoglu, G.: Inference in MLS database systems. IEEE Trans. Knowledge and Data Eng.\u00a03(4), 474\u2013485 (1991)","journal-title":"IEEE Trans. Knowledge and Data Eng."},{"issue":"2,3","key":"9_CR18","doi-asserted-by":"crossref","first-page":"147","DOI":"10.3233\/JCS-1994\/1995-32-304","volume":"3","author":"T.H. Hinke","year":"1995","unstructured":"Hinke, T.H., Delugach, H.S., Chandrasekhar, A.: A fast algorithm for detecting second paths in database inference analysis. Jour. of Computer Security\u00a03(2,3), 147\u2013168 (1995)","journal-title":"Jour. of Computer Security"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/0167-4048(87)90029-0","volume":"6","author":"B.M. Thuraisingham","year":"1987","unstructured":"Thuraisingham, B.M.: Security checking in relational database management systems augmented with inference engines. Computers and Security\u00a06, 479\u2013492 (1987)","journal-title":"Computers and Security"},{"key":"9_CR20","volume-title":"Principles of Database and Knowledge-base Systems","author":"J.D. Ullman","year":"1988","unstructured":"Ullman, J.D.: Principles of Database and Knowledge-base Systems, vol.\u00a01,2. Computer Science Press, Rockville (1988)"},{"doi-asserted-by":"crossref","unstructured":"Yip, R.W., Levitt, K.N.: Data level inference detection in database systems. In: Proc. of the 11th IEEE Computer Security Foundation Workshop, Rockport, MA, June 1998, pp. 179\u2013189 (1998)","key":"9_CR21","DOI":"10.1109\/CSFW.1998.683168"}],"container-title":["Lecture Notes in Computer Science","Secure Data Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11552338_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:44:05Z","timestamp":1605642245000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11552338_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540287988","9783540319740"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11552338_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}