{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:29:19Z","timestamp":1725496159664},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540771128"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77115-9_9","type":"book-chapter","created":{"date-parts":[[2007,11,29]],"date-time":"2007-11-29T05:11:56Z","timestamp":1196313116000},"page":"89-96","source":"Crossref","is-referenced-by-count":0,"title":["Monitoring Information Leakage During Query Aggregation"],"prefix":"10.1007","author":[{"given":"Sastry","family":"Konduri","sequence":"first","affiliation":[]},{"given":"Brajendra","family":"Panda","sequence":"additional","affiliation":[]},{"given":"Wing-Ning","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Anderson, R.: An integrated Survey of Medical Databases (1998), \n                    \n                      http:\/\/www.clcam.ac.uk\/simrja14\/caldicott\/caldicott.html"},{"key":"9_CR2","unstructured":"Burns, R.K.: Integrity and Secracy: Fundamental Conflicts in the Database Environment. In: Proceedings of the Third RADC Database Security Workshop, pp. 37\u201340 (1990)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Chang, L.W., Mokowitz, I.: A Study of Inference Problems in Distributed Databases. In: Research Directions in Data and Applications Security, 16th Annual Edition, pp. 191\u2013204","DOI":"10.21236\/ADA464386"},{"key":"9_CR4","unstructured":"Chen, Y., Chu, W.: Database Security Protection via Inference Detection, Computer Science Department, University of California, Los Angeles, CA, USA"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Hinke, T.H.: Inference Aggregation Detection in Database Management Systems. In: First IEEE Computer Security Foundations Workshop (1988)","DOI":"10.1109\/SECPRI.1988.8101"},{"key":"9_CR6","volume-title":"Information Security and Collection of Essays","author":"S. Jajodia","year":"1995","unstructured":"Jajodia, S., Meadows, C.: Inference Problems in Multilevel Secure Database Management Systems. In: Abrams, M. (ed.) Information Security and Collection of Essays, IEEE Press, Los Alamitos (1995)"},{"key":"9_CR7","unstructured":"Meadows, C., Jajodia, S.: Integrity versus Security in Multilevel Secure Databases. In: Database Security: Status and Prospects (1988)"},{"key":"9_CR8","volume-title":"Security and Inference in Multilevel Database and Knowledge-Base Systems","author":"M. Morgernstern","year":"1987","unstructured":"Morgernstern, M.: Security and Inference in Multilevel Database and Knowledge-Base Systems. SRI International Computer Science Laboratory, Menlo Park, CA (1987)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Simpson, A., Power, D., Slaymaker, M.: On Tracker Attacks in Health Grids. In: Proceedings of the 2006 ACM Symposium on Applied Computing, Dijon, France (April 2006)","DOI":"10.1145\/1141277.1141326"},{"key":"9_CR10","unstructured":"Thuraisingham, B.: Recursion Theoritic Properties of the Inference Problem. In: Third IEEE Computer Security Foundations Workshop (1990)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Qian, X., Stickel, M., Karp, P., Lunt, T., Garvey, T.: Detection and Elimination of Inference Channels in Multilevel Relational Database Systems. In: IEEE Symposium on Security and Privacy (1993)","DOI":"10.1109\/RISP.1993.287632"},{"key":"9_CR12","volume-title":"Data Level Inference Detection in Database Systeme","author":"R.W. Yip","year":"1998","unstructured":"Yip, R.W., Levitt, K.N.: Data Level Inference Detection in Database Systeme. Department of Computer Science, University of California, Davis, CA, USA (1998)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77115-9_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:01:00Z","timestamp":1619506860000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77115-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540771128"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77115-9_9","relation":{},"subject":[]}}