{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T22:10:02Z","timestamp":1748556602972,"version":"3.41.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319227283"},{"type":"electronic","value":"9783319227290"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22729-0_31","type":"book-chapter","created":{"date-parts":[[2015,8,4]],"date-time":"2015-08-04T11:40:07Z","timestamp":1438688407000},"page":"403-415","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Exact Detection of Information Leakage in Database Access Control"],"prefix":"10.1007","author":[{"given":"Farid","family":"Alborzi","sequence":"first","affiliation":[]},{"given":"Rada","family":"Chirkova","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,5]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Abiteboul, S., Duschka, O.: Complexity of answering queries using materialized views. In: PODS, pp. 254\u2013263 (1998)","DOI":"10.1145\/275487.275516"},{"key":"31_CR2","volume-title":"Foundations of Databases","author":"S Abiteboul","year":"1995","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Bayardo Jr., R.J., Faloutsos, C., Kiernan, J., Rantzau, R., Srikant, R.: Auditing compliance with a hippocratic database. In: VLDB, pp. 516\u2013527 (2004)","DOI":"10.1016\/B978-012088469-8.50047-4"},{"issue":"10","key":"31_CR4","first-page":"2069","volume":"23","author":"E Al-Shaer","year":"2005","unstructured":"Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. IEEE JSAC 23(10), 2069\u20132084 (2005)","journal-title":"IEEE JSAC"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Ammann, P., Sandhu, R.S.: Safety analysis for the extended schematic protection model. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 87\u201397 (1991)","DOI":"10.1109\/RISP.1991.130777"},{"issue":"1","key":"31_CR6","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/1558334.1558341","volume":"38","author":"P Barcelo","year":"2009","unstructured":"Barcelo, P.: Logical foundations of relational data exchange. SIGMOD Rec. 38(1), 49\u201358 (2009)","journal-title":"SIGMOD Rec."},{"issue":"1\u20132","key":"31_CR7","first-page":"1","volume":"3","author":"E Bertino","year":"2011","unstructured":"Bertino, E., Ghinita, G., Kamra, A.: Access control for databases: concepts and systems. Found. Trends Databases 3(1\u20132), 1\u2013148 (2011)","journal-title":"Found. Trends Databases"},{"issue":"1\u20132","key":"31_CR8","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1023\/A:1026106029043","volume":"40","author":"J Biskup","year":"2004","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40(1\u20132), 37\u201362 (2004)","journal-title":"Ann. Math. Artif. Intell."},{"key":"31_CR9","volume-title":"Understanding DB2 9 Security","author":"R Bond","year":"2006","unstructured":"Bond, R., See, K.Y.-K., Wong, C.K.M., Chan, Y.-K.H.: Understanding DB2 9 Security. IBM Press, Indianapolis (2006)"},{"issue":"6","key":"31_CR10","first-page":"900","volume":"12","author":"A Brodsky","year":"2000","unstructured":"Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: constraints, inference channels, and monitoring disclosures. IEEE TKDE 12(6), 900\u2013919 (2000)","journal-title":"IEEE TKDE"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Chandra, A., Merlin, P.: Optimal implementation of conjunctive queries in relational data bases. In: STOC, pp. 77\u201390 (1977)","DOI":"10.1145\/800105.803397"},{"issue":"1\u20132","key":"31_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1900000008","volume":"2","author":"B-C Chen","year":"2009","unstructured":"Chen, B.-C., Kifer, D., LeFevre, K., Machanavajjhala, A.: Privacy-preserving data publishing. Found. Trends Databases 2(1\u20132), 1\u2013167 (2009)","journal-title":"Found. Trends Databases"},{"key":"31_CR13","unstructured":"Chirkova, R., Yu, T.: Detecting information leakage in database access control with help from data exchange. Technical report (which is not a publication) TR-2013-1, NCSU (2013). http:\/\/www.csc.ncsu.edu\/research\/tech\/reports.php"},{"key":"31_CR14","unstructured":"Deutsch, A.: XML query reformulation over mixed and redundant storage. Ph.D. thesis, Univ. Pennsylvania (2002)"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Deutsch, A., Nash, A., Remmel, J.: The chase revisited. In: PODS, pp. 149\u2013158 (2008)","DOI":"10.1145\/1376916.1376938"},{"key":"31_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/3-540-46093-4_2","volume-title":"Database Programming Languages","author":"A Deutsch","year":"2002","unstructured":"Deutsch, A., Tannen, V.: Optimization properties for classes of conjunctive regular path queries. In: Ghelli, G., Grahne, G. (eds.) DBPL 2001. LNCS, vol. 2397, pp. 21\u201339. Springer, Heidelberg (2002)"},{"key":"31_CR17","series-title":"Lecture Notes in Computer Science","volume-title":"Inference Control in Statistical Databases: From Theory to Practice","year":"2002","unstructured":"Domingo-Ferrer, J. (ed.): Inference Control in Statistical Databases. LNCS, vol. 2316. Springer, Heidelberg (2002)"},{"issue":"1","key":"31_CR18","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.tcs.2004.10.033","volume":"336","author":"R Fagin","year":"2005","unstructured":"Fagin, R., Kolaitis, P., Miller, R., Popa, L.: Data exchange: semantics and query answering. Theor. Comput. Sci. 336(1), 89\u2013124 (2005)","journal-title":"Theor. Comput. Sci."},{"issue":"4","key":"31_CR19","doi-asserted-by":"publisher","first-page":"1454","DOI":"10.1145\/1189769.1189778","volume":"31","author":"A Fuxman","year":"2006","unstructured":"Fuxman, A., Kolaitis, P.G., Miller, R.J., Tan, W.-C.: Peer data exchange. ACM TODS 31(4), 1454\u20131498 (2006)","journal-title":"ACM TODS"},{"key":"31_CR20","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"MA Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Comm. ACM 19, 461\u2013471 (1976)","journal-title":"Comm. ACM"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Kabra, G., Ramamurthy, R., Sudarshan, S.: Redundancy and information leakage in finite-grained access control. In: ACM SIGMOD Conference, pp. 133\u2013144 (2006)","DOI":"10.1145\/1142473.1142489"},{"key":"31_CR22","unstructured":"Li, N., Winsborough, W.H., Mitchell, J.C.: Beyond proof-of-compliance: safety and availability analysis in trust management. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 123\u2013139 (2003)"},{"issue":"3","key":"31_CR23","first-page":"507","volume":"73","author":"G Miklau","year":"2007","unstructured":"Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. JCSS 73(3), 507\u2013534 (2007)","journal-title":"JCSS"},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Motwani, R., Nabar, S., Thomas, D.: Auditing SQL queries. In: ICDE 2008 (2008)","DOI":"10.1109\/ICDE.2008.4497437"},{"key":"31_CR25","unstructured":"The Virtual Private Database in Oracle9iR2. An Oracle White Paper (2002)"},{"key":"31_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/11546924_32","volume-title":"Database and Expert Systems Applications","author":"K Stoffel","year":"2005","unstructured":"Stoffel, K., Studer, T.: Provable data privacy. In: Andersen, K.V., Debenham, J., Wagner, R. (eds.) DEXA 2005. LNCS, vol. 3588, pp. 324\u2013332. Springer, Heidelberg (2005)"},{"issue":"6","key":"31_CR27","first-page":"894","volume":"9","author":"X Zhang","year":"1997","unstructured":"Zhang, X., Ozsoyoglu, M.: Implication and referential constraints: a new formal reasoning. IEEE TKDE 9(6), 894\u2013910 (1997)","journal-title":"IEEE TKDE"},{"key":"31_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-540-30570-5_18","volume-title":"Database Theory - ICDT 2005","author":"Z Zhang","year":"2005","unstructured":"Zhang, Z., Mendelzon, A.O.: Authorization views and conditional query containment. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 259\u2013273. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Big Data Analytics and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22729-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T21:36:44Z","timestamp":1748554604000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22729-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319227283","9783319227290"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22729-0_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"5 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}