{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:43:08Z","timestamp":1761896588451},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662556078"},{"type":"electronic","value":"9783662556085"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-55608-5_1","type":"book-chapter","created":{"date-parts":[[2017,7,28]],"date-time":"2017-07-28T11:42:33Z","timestamp":1501242153000},"page":"1-23","source":"Crossref","is-referenced-by-count":4,"title":["Exact Detection of Information Leakage: Decidability and Complexity"],"prefix":"10.1007","author":[{"given":"Rada","family":"Chirkova","sequence":"first","affiliation":[]},{"given":"Ting","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,29]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abiteboul, S., Duschka, O.: Complexity of answering queries using materialized views. In: Proceedings of ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS), pp. 254\u2013263 (1998)","DOI":"10.1145\/275487.275516"},{"key":"1_CR2","volume-title":"Foundations of Databases","author":"S Abiteboul","year":"1995","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Bayardo Jr., R.J., Faloutsos, C., Kiernan, J., Rantzau, R., Srikant, R.: Auditing compliance with a hippocratic database. In: Proceedings of Very Large Data Bases (VLDB) Conference, pp. 516\u2013527 (2004)","DOI":"10.1016\/B978-012088469-8.50047-4"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/978-3-319-22729-0_31","volume-title":"Big Data Analytics and Knowledge Discovery","author":"F Alborzi","year":"2015","unstructured":"Alborzi, F., Chirkova, R., Yu, T.: Exact detection of information leakage in database access control. In: Madria, S., Hara, T. (eds.) DaWaK 2015. LNCS, vol. 9263, pp. 403\u2013415. Springer, Cham (2015). doi: 10.1007\/978-3-319-22729-0_31"},{"issue":"10","key":"1_CR5","doi-asserted-by":"crossref","first-page":"2069","DOI":"10.1109\/JSAC.2005.854119","volume":"23","author":"E Al-Shaer","year":"2005","unstructured":"Al-Shaer, E., Hamed, H., Boutaba, R., Hasan, M.: Conflict classification and analysis of distributed firewall policies. IEEE J. Sel. Areas Commun. 23(10), 2069\u20132084 (2005)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Ammann, P., Sandhu, R.S.: Safety analysis for the extended schematic protection model. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 87\u201397 (1991)","DOI":"10.1109\/RISP.1991.130777"},{"issue":"1","key":"1_CR7","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/1558334.1558341","volume":"38","author":"P Barcelo","year":"2009","unstructured":"Barcelo, P.: Logical foundations of relational data exchange. SIGMOD Rec. 38(1), 49\u201358 (2009)","journal-title":"SIGMOD Rec."},{"issue":"1\u20132","key":"1_CR8","first-page":"1","volume":"3","author":"E Bertino","year":"2011","unstructured":"Bertino, E., Ghinita, G., Kamra, A.: Access control for databases: concepts and systems. Found. Trends Databases 3(1\u20132), 1\u2013148 (2011)","journal-title":"Found. Trends Databases"},{"issue":"1\u20132","key":"1_CR9","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1023\/A:1026106029043","volume":"40","author":"J Biskup","year":"2004","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40(1\u20132), 37\u201362 (2004)","journal-title":"Ann. Math. Artif. Intell."},{"key":"1_CR10","volume-title":"Understanding DB2 9 Security","author":"R Bond","year":"2006","unstructured":"Bond, R., See, K.Y.-K., Wong, C.K.M., Chan, Y.-K.H.: Understanding DB2 9 Security. IBM Press, Indianapolis (2006)"},{"issue":"6","key":"1_CR11","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/69.895801","volume":"12","author":"A Brodsky","year":"2000","unstructured":"Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng. 12(6), 900\u2013919 (2000)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Chandra, A., Merlin, P.: Optimal implementation of conjunctive queries in relational data bases. In: Proceedings of the 9th Annual ACM Symposium on Theory of Computing (STOC), pp. 77\u201390 (1977)","DOI":"10.1145\/800105.803397"},{"issue":"1\u20132","key":"1_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/1900000008","volume":"2","author":"B-C Chen","year":"2009","unstructured":"Chen, B.-C., Kifer, D., LeFevre, K., Machanavajjhala, A.: Privacy-preserving data publishing. Found. Trends Databases 2(1\u20132), 1\u2013167 (2009)","journal-title":"Found. Trends Databases"},{"key":"1_CR14","unstructured":"Deutsch, A.: XML query reformulation over mixed and redundant storage. Ph.D. thesis, University of Pennsylvania (2002)"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Deutsch, A., Nash, A., Remmel, J.: The chase revisited. In: Proceedings of ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS), pp. 149\u2013158 (2008)","DOI":"10.1145\/1376916.1376938"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/3-540-46093-4_2","volume-title":"Database Programming Languages","author":"A Deutsch","year":"2002","unstructured":"Deutsch, A., Tannen, V.: Optimization properties for classes of conjunctive regular path queries. In: Ghelli, G., Grahne, G. (eds.) DBPL 2001. LNCS, vol. 2397, pp. 21\u201339. Springer, Heidelberg (2002). doi: 10.1007\/3-540-46093-4_2"},{"key":"1_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-47804-3","volume-title":"Inference Control in Statistical Databases: From Theory to Practice","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J.: Inference Control in Statistical Databases: From Theory to Practice. Springer, Heidelberg (2002)"},{"issue":"1","key":"1_CR18","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.tcs.2004.10.033","volume":"336","author":"R Fagin","year":"2005","unstructured":"Fagin, R., Kolaitis, P., Miller, R., Popa, L.: Data exchange: semantics and query answering. Theor. Comput. Sci. 336(1), 89\u2013124 (2005)","journal-title":"Theor. Comput. Sci."},{"issue":"4","key":"1_CR19","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1145\/1189769.1189778","volume":"31","author":"A Fuxman","year":"2006","unstructured":"Fuxman, A., Kolaitis, P.G., Miller, R.J., Tan, W.-C.: Peer data exchange. ACM Trans. Database Syst. 31(4), 1454\u20131498 (2006)","journal-title":"ACM Trans. Database Syst."},{"key":"1_CR20","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"MA Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Commun. ACM 19, 461\u2013471 (1976)","journal-title":"Commun. ACM"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Kabra, G., Ramamurthy, R., Sudarshan, S.: Redundancy and information leakage in finite-grained access control. In: Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 133\u2013144 (2006)","DOI":"10.1145\/1142473.1142489"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Kaushik, R., Ramamurthy, R.: Efficient auditing for complex SQL queries. In: Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 697\u2013708 (2011)","DOI":"10.1145\/1989323.1989396"},{"key":"1_CR23","unstructured":"Li, N., Winsborough, W.H., Mitchell, J.C.: Beyond proof-of-compliance: safety and availability analysis in trust management. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 123\u2013139 (2003)"},{"issue":"3","key":"1_CR24","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/j.jcss.2006.10.004","volume":"73","author":"G Miklau","year":"2007","unstructured":"Miklau, G., Suciu, D.: A formal analysis of information disclosure in data exchange. J. Comput. Syst. Sci. 73(3), 507\u2013534 (2007)","journal-title":"J. Comput. Syst. Sci."},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Motwani, R., Nabar, S., Thomas, D.: Auditing SQL queries. In: Proceedings of IEEE International Conference on Data Engineering (ICDE), pp. 287\u2013296 (2008)","DOI":"10.1109\/ICDE.2008.4497437"},{"key":"1_CR26","unstructured":"The Virtual Private Database in Oracle9iR2. An Oracle White Paper (2002)"},{"key":"1_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/11546924_32","volume-title":"Database and Expert Systems Applications","author":"K Stoffel","year":"2005","unstructured":"Stoffel, K., Studer, T.: Provable data privacy. In: Andersen, K.V., Debenham, J., Wagner, R. (eds.) DEXA 2005. LNCS, vol. 3588, pp. 324\u2013332. Springer, Heidelberg (2005). doi: 10.1007\/11546924_32"},{"issue":"6","key":"1_CR28","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1109\/69.649315","volume":"9","author":"X Zhang","year":"1997","unstructured":"Zhang, X., Ozsoyoglu, M.: Implication and referential constraints: a new formal reasoning. IEEE Trans. Knowl. Data Eng. 9(6), 894\u2013910 (1997)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-540-30570-5_18","volume-title":"Database Theory - ICDT 2005","author":"Z Zhang","year":"2004","unstructured":"Zhang, Z., Mendelzon, A.O.: Authorization views and conditional query containment. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 259\u2013273. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-30570-5_18"}],"container-title":["Lecture Notes in Computer Science","Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-55608-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T19:23:08Z","timestamp":1569957788000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-55608-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662556078","9783662556085"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-55608-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}