{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:23:14Z","timestamp":1742397794218,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735335"},{"type":"electronic","value":"9783540735380"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73538-0_1","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T03:45:05Z","timestamp":1187235905000},"page":"1-13","source":"Crossref","is-referenced-by-count":6,"title":["Confidentiality Policies for Controlled Query Evaluation"],"prefix":"10.1007","author":[{"given":"Joachim","family":"Biskup","sequence":"first","affiliation":[]},{"given":"Torben","family":"Weibert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","volume-title":"Database Security","author":"S. Castano","year":"1995","unstructured":"Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. ACM Press, New York (1995)"},{"key":"1_CR2","volume-title":"Cryptography and Data Security","author":"D. Denning","year":"1982","unstructured":"Denning, D.: Cryptography and Data Security. Addison-Wesley, London, UK (1982)"},{"key":"1_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-4316-5","volume-title":"Principles of Data Security","author":"E.L. Leiss","year":"1982","unstructured":"Leiss, E.L.: Principles of Data Security. Plenum Press, New York (1982)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Inference Control in Statistical Databases","year":"2002","unstructured":"Domingo-Ferrer, J. (ed.): Inference Control in Statistical Databases. LNCS, vol.\u00a02316. Springer, Heidelberg (2002)"},{"key":"1_CR5","first-page":"161","volume-title":"IEEE Symposium on Security and Privacy","author":"L. Wang","year":"2004","unstructured":"Wang, L., Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: IEEE Symposium on Security and Privacy, pp. 161\u2013178. IEEE Computer Society, Los Alamitos (2004)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-39205-X","volume-title":"Computer Security \u2013 ESORICS 2003","author":"L. Wang","year":"2003","unstructured":"Wang, L., Li, Y., Wijesekera, D., Jajodia, S.: Precisely answering multi-dimensional range queries without privacy breaches. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, Springer, Heidelberg (2003)"},{"issue":"6","key":"1_CR7","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/69.895801","volume":"12","author":"A. Brodsky","year":"2000","unstructured":"Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Transactions on Knowledge and Data Engineering\u00a012(6), 900\u2013919 (2000)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"6","key":"1_CR8","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/32.55088","volume":"16","author":"T.F. Lunt","year":"1990","unstructured":"Lunt, T.F., Denning, D.E., Schell, R.R., Heckman, M., Shockley, W.R.: The seaview security model. IEEE Transactions on Software Engineering\u00a016(6), 593\u2013607 (1990)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"1_CR9","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1109\/69.591453","volume":"9","author":"X. Qian","year":"1997","unstructured":"Qian, X., Lunt, T.F.: A semantic framework of the multilevel secure relational model. IEEE Transactions on Knowledge and Data Engineering\u00a09(2), 292\u2013301 (1997)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Staddon, J.: Dynamic inference control. In: 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, pp. 94\u2013100 (2003)","DOI":"10.1145\/882082.882103"},{"issue":"4","key":"1_CR11","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1145\/195664.195675","volume":"19","author":"M. Winslett","year":"1994","unstructured":"Winslett, M., Smith, K., Qian, X.: Formal query languages for secure relational databases. ACM Transactions on Database Systems\u00a019(4), 626\u2013662 (1994)","journal-title":"ACM Transactions on Database Systems"},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C. Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explorations\u00a04(2), 6\u201311 (2002)","journal-title":"SIGKDD Explorations"},{"issue":"1","key":"1_CR13","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/319830.319833","volume":"8","author":"G.L. Sicherman","year":"1983","unstructured":"Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Transactions on Database Systems\u00a08(1), 41\u201359 (1983)","journal-title":"ACM Transactions on Database Systems"},{"issue":"3","key":"1_CR14","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/69.390247","volume":"7","author":"P.A. Bonatti","year":"1995","unstructured":"Bonatti, P.A., Kraus, S., Subrahmanian, V.: Foundations of secure deductive databases. IEEE Transactions on Knowledge and Data Engineering\u00a07(3), 406\u2013422 (1995)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0169-023X(99)00043-9","volume":"33","author":"J. Biskup","year":"2000","unstructured":"Biskup, J.: For unknown secrecies refusal is better than lying. Data & Knowledge Engineering\u00a033, 1\u201323 (2000)","journal-title":"Data & Knowledge Engineering"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/11663881_4","volume-title":"Foundations of Information and Knowledge Systems","author":"J. Biskup","year":"2006","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FoIKS 2006. LNCS, vol.\u00a03861, pp. 43\u201362. Springer, Heidelberg (2006)"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0169-023X(01)00024-6","volume":"38","author":"J. Biskup","year":"2001","unstructured":"Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data & Knowledge Engineering\u00a038, 199\u2013222 (2001)","journal-title":"Data & Knowledge Engineering"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s10207-004-0032-1","volume":"3","author":"J. Biskup","year":"2004","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security\u00a03, 14\u201327 (2004)","journal-title":"International Journal of Information Security"},{"key":"1_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1023\/A:1026106029043","volume":"40","author":"J. Biskup","year":"2004","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Annals of Mathematics and Artificial Intelligence\u00a040, 37\u201362 (2004)","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Biskup, J., Weibert, T.: Refusal in incomplete databases. In: Research Directions in Data and Applications Security XVIII, pp. 143\u2013157. Kluwer\/Springer (2004)","DOI":"10.1007\/1-4020-8128-6_10"},{"key":"1_CR21","unstructured":"Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Extended abstract presented at the LICS 2005 Affiliated Workshop on Foundations of Computer Security (FCS 2005) (2005), (submitted, 2007), available from http:\/\/www.cs.chalmers.se\/~andrei\/FCS05\/fcs05.pdf"},{"key":"1_CR22","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","volume-title":"Reasoning About Knowledge","author":"R. Fagin","year":"1995","unstructured":"Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning About Knowledge. MIT Press, Cambridge (1995)"},{"key":"1_CR23","unstructured":"University of Dortmund, Information Systems and Security: CQE prototype implementation, http:\/\/ls6-www.cs.uni-dortmund.de\/issi\/projects\/cqe\/"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/3-540-44875-6_20","volume-title":"Trust Management","author":"M. Winslett","year":"2003","unstructured":"Winslett, M.: An introduction to trust negotiation. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol.\u00a02692, pp. 275\u2013283. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security XXI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73538-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T11:16:12Z","timestamp":1737371772000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73538-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540735335","9783540735380"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73538-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}