{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:16:54Z","timestamp":1725491814240},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540754954"},{"type":"electronic","value":"9783540754961"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75496-1_27","type":"book-chapter","created":{"date-parts":[[2007,9,18]],"date-time":"2007-09-18T03:29:35Z","timestamp":1190086175000},"page":"407-422","source":"Crossref","is-referenced-by-count":7,"title":["Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control"],"prefix":"10.1007","author":[{"given":"Joachim","family":"Biskup","sequence":"first","affiliation":[]},{"given":"Jan-Hendrik","family":"Lochner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","volume-title":"Foundations of Databases","author":"S. Abiteboul","year":"1995","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, London (1995)"},{"issue":"3","key":"27_CR2","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/BF00288683","volume":"1","author":"R. Bayer","year":"1972","unstructured":"Bayer, R., McCreight, E.M.: Organization and maintenance of large ordered indices. Acta Informatica\u00a01(3), 173\u2013189 (1972)","journal-title":"Acta Informatica"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer systems: Unified exposition and MULTICS interpretation. Technical Report ESD-TR-75-306, The MITRE Corporation (1975)","DOI":"10.21236\/ADA023588"},{"issue":"1","key":"27_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TDSC.2005.9","volume":"2","author":"E. Bertino","year":"2005","unstructured":"Bertino, E., Sandhu, R.S.: Database security\u2014concepts, approaches, and challenges. IEEE Trans. Dependable Sec. Comput.\u00a02(1), 2\u201318 (2005)","journal-title":"IEEE Trans. Dependable Sec. Comput."},{"key":"27_CR5","volume-title":"Computer Security: Art and Science","author":"M. Bishop","year":"2003","unstructured":"Bishop, M.: Computer Security: Art and Science. Addison-Wesley, London (2003)"},{"issue":"1","key":"27_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0169-023X(99)00043-9","volume":"33","author":"J. Biskup","year":"2000","unstructured":"Biskup, J.: For unknown secrecies refusal is better than lying. Data Knowl. Eng.\u00a033(1), 1\u201323 (2000)","journal-title":"Data Knowl. Eng."},{"issue":"2","key":"27_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0169-023X(01)00024-6","volume":"38","author":"J. Biskup","year":"2001","unstructured":"Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng.\u00a038(2), 199\u2013222 (2001)","journal-title":"Data Knowl. Eng."},{"key":"27_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-45853-0_3","volume-title":"Computer Security - ES-ORICS 2002","author":"J. Biskup","year":"2002","unstructured":"Biskup, J., Bonatti, P.A.: Confidentiality policies and their enforcement for controlled query evaluation. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.\u00a02502, pp. 39\u201354. Springer, Heidelberg (2002)"},{"issue":"1-2","key":"27_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1023\/A:1026106029043","volume":"40","author":"J. Biskup","year":"2004","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell.\u00a040(1-2), 37\u201362 (2004)","journal-title":"Ann. Math. Artif. Intell."},{"issue":"1","key":"27_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s10207-004-0032-1","volume":"3","author":"J. Biskup","year":"2004","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec.\u00a03(1), 14\u201327 (2004)","journal-title":"Int. J. Inf. Sec."},{"key":"27_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/11663881_4","volume-title":"Foundations of Information and Knowledge Systems","author":"J. Biskup","year":"2006","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FoIKS 2006. LNCS, vol.\u00a03861, pp. 43\u201362. Springer, Heidelberg (2006)"},{"issue":"3","key":"27_CR12","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/69.390247","volume":"7","author":"P.A. Bonatti","year":"1995","unstructured":"Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of secure deductive databases. IEEE Trans. Knowl. Data Eng.\u00a07(3), 406\u2013422 (1995)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"27_CR13","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/69.895801","volume":"12","author":"A. Brodsky","year":"2000","unstructured":"Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng.\u00a012(6), 900\u2013919 (2000)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"27_CR14","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/S0169-023X(98)00044-5","volume":"29","author":"F. Cuppens","year":"1999","unstructured":"Cuppens, F., Gabillon, A.: Logical foundations of multilevel databases. Data Knowl. Eng.\u00a029(3), 259\u2013291 (1999)","journal-title":"Data Knowl. Eng."},{"issue":"2","key":"27_CR15","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/S0169-023X(01)00006-4","volume":"37","author":"F. Cuppens","year":"2001","unstructured":"Cuppens, F., Gabillon, A.: Cover story management. Data Knowl. Eng.\u00a037(2), 177\u2013201 (2001)","journal-title":"Data Knowl. Eng."},{"key":"27_CR16","first-page":"181","volume-title":"IEEE Symposium on Security and Privacy","author":"S. Dawson","year":"1999","unstructured":"Dawson, S., di Vimercati, S.D.C., Samarati, P.: Specification and enforcement of classification and inference constraints. In: IEEE Symposium on Security and Privacy, pp. 181\u2013195. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Dawson, S., di Vimercati, S.D.C., Lincoln, P., Samarati, P.: Minimal data upgrading to prevent inference and association. In: Proc. PODS 1999, pp. 114\u2013125 (1999)","DOI":"10.1145\/303976.303988"},{"key":"27_CR18","volume-title":"Cryptography and Data Security","author":"D.E. Denning","year":"1983","unstructured":"Denning, D.E.: Cryptography and Data Security. Addison-Wesley, London (1983)"},{"issue":"2","key":"27_CR19","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C. Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explorations\u00a04(2), 6\u201311 (2002)","journal-title":"SIGKDD Explorations"},{"issue":"7","key":"27_CR20","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/j.infsof.2004.09.013","volume":"47","author":"E. Fern\u00e1ndez-Medina","year":"2005","unstructured":"Fern\u00e1ndez-Medina, E., Piattini, M.: Designing secure databases. Information & Software Technology\u00a047(7), 463\u2013477 (2005)","journal-title":"Information & Software Technology"},{"key":"27_CR21","volume-title":"Computer Security","author":"D. Gollmann","year":"2006","unstructured":"Gollmann, D.: Computer Security, 2nd edn. John Wiley & Sons, Chichester (2006)","edition":"2"},{"issue":"6","key":"27_CR22","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/32.55088","volume":"16","author":"T.F. Lunt","year":"1990","unstructured":"Lunt, T.F., Denning, D.D., Schell, R.R., Heckman, M., Shockley, W.R.: The SeaView security model. IEEE Trans. Software Eng.\u00a016(6), 593\u2013607 (1990)","journal-title":"IEEE Trans. Software Eng."},{"issue":"2","key":"27_CR23","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/0020-0190(85)90065-1","volume":"20","author":"J. McLean","year":"1985","unstructured":"McLean, J.: A comment on the \u2018Basic Security Theorem\u2019 of Bell and LaPadula. Inf. Process. Lett.\u00a020(2), 67\u201370 (1985)","journal-title":"Inf. Process. Lett."},{"key":"27_CR24","first-page":"123","volume-title":"IEEE Symposium on Security and Privacy","author":"J. McLean","year":"1987","unstructured":"McLean, J.: Reasoning about security models. In: IEEE Symposium on Security and Privacy, pp. 123\u2013131. IEEE Computer Society Press, Los Alamitos (1987)"},{"issue":"1","key":"27_CR25","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.48795","volume":"23","author":"J. McLean","year":"1990","unstructured":"McLean, J.: The specification and modeling of computer security. IEEE Computer\u00a023(1), 9\u201316 (1990)","journal-title":"IEEE Computer"},{"key":"27_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/3-540-61770-1_29","volume-title":"ESORICS 1996","author":"V. Nicomette","year":"1996","unstructured":"Nicomette, V., Deswarte, Y.: A multilevel security model for distributed object systems. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 80\u201398. Springer, Heidelberg (1996)"},{"issue":"1","key":"27_CR27","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/174638.174640","volume":"19","author":"M.S. Olivier","year":"1994","unstructured":"Olivier, M.S., von Solms, S.H.: A taxonomy for secure object-oriented databases. ACM Trans. Database Syst.\u00a019(1), 3\u201346 (1994)","journal-title":"ACM Trans. Database Syst."},{"key":"27_CR28","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1145\/1007568.1007631","volume-title":"Proc. ACM SIGMOD 2004","author":"S. Rizvi","year":"2004","unstructured":"Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proc. ACM SIGMOD 2004, pp. 551\u2013562. ACM Press, New York (2004)"},{"key":"27_CR29","unstructured":"Rosenthal, A., Sciore, E., Wright, R.N.: Simplifying policy administration for distributed privacy-preserving computation (2007), http:\/\/www.mitre.org\/staffpages\/arnie\/pubs\/simplifying_policy_admin_privacy_reserving.pdf"},{"issue":"11","key":"27_CR30","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"R. Sandhu","year":"1993","unstructured":"Sandhu, R.: Lattice-based access control models. IEEE Computer\u00a026(11), 9\u201319 (1993)","journal-title":"IEEE Computer"},{"issue":"1","key":"27_CR31","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/319830.319833","volume":"8","author":"G.L. Sicherman","year":"1983","unstructured":"Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst.\u00a08(1), 41\u201359 (1983)","journal-title":"ACM Trans. Database Syst."},{"key":"27_CR32","doi-asserted-by":"crossref","unstructured":"Stonebraker, M., Wong, E.: Access control in a relational data base management system by query modification. In: Proc. ACM\/CSC-ER Annual Conference, pp. 180\u2013186 (1974)","DOI":"10.1145\/800182.810400"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75496-1_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:22:04Z","timestamp":1619504524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75496-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540754954","9783540754961"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75496-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}