{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T01:10:04Z","timestamp":1772845804088,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,8,7]],"date-time":"2007-08-07T00:00:00Z","timestamp":1186444800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1007\/s10207-007-0037-7","type":"journal-article","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T06:12:53Z","timestamp":1186380773000},"page":"199-217","source":"Crossref","is-referenced-by-count":31,"title":["Keeping secrets in incomplete databases"],"prefix":"10.1007","volume":"7","author":[{"given":"Joachim","family":"Biskup","sequence":"first","affiliation":[]},{"given":"Torben","family":"Weibert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,8,7]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0169-023X(99)00043-9","volume":"33","author":"J. Biskup","year":"2000","unstructured":"Biskup J. (2000). For unknown secrecies refusal is better than lying. Data and Know. Eng. 33: 1\u201323","journal-title":"Data and Know. Eng."},{"key":"37_CR2","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0169-023X(01)00024-6","volume":"38","author":"J. Biskup","year":"2001","unstructured":"Biskup J. and Bonatti P.A. (2001). Lying versus refusal for known potential secrets. Data Knowl. Eng. 38: 199\u2013222","journal-title":"Data Knowl. Eng."},{"key":"37_CR3","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/s10207-004-0032-1","volume":"3","author":"J. Biskup","year":"2004","unstructured":"Biskup J. and Bonatti P.A. (2004). Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Security 3: 14\u201327","journal-title":"Int. J. Inf. Security"},{"key":"37_CR4","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1023\/A:1026106029043","volume":"40","author":"J. Biskup","year":"2004","unstructured":"Biskup J. and Bonatti P.A. (2004). Controlled query evaluation for known policies by combining lying and refusal. Ann. Mathe. Artifi. Intell. 40: 37\u201362","journal-title":"Ann. Mathe. Artifi. Intell."},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. In: Dix, J., Hegner, S.J. (eds.) FoIKS, Lecture Notes in Computer Science, vol. 3861, pp. 43\u201362. Springer (2006)","DOI":"10.1007\/11663881_4"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Biskup, J., Weibert, T.: Refusal in incomplete databases. In: Farkas, C., Samarati, P. (eds.) Research Directions in Data and Applications Security XVIII, vol. 144, pp. 143\u2013157. Kluwer\/ Springer (2004)","DOI":"10.1007\/1-4020-8128-6_10"},{"key":"37_CR7","doi-asserted-by":"crossref","unstructured":"Biskup, J., Weibert, T.: Confidentiality policies for controlled query evaluation. In: Barker, S., Ahn, G.-J. (eds) 21st Annual IFIP WG 11.3 Working Conference on Applications and Data Security, Lecture Notes in Computer Science, vol. 4602, pp. 1\u201313, Springer (2007)","DOI":"10.1007\/978-3-540-73538-0_1"},{"issue":"3","key":"37_CR8","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1109\/69.390247","volume":"7","author":"P.A. Bonatti","year":"1995","unstructured":"Bonatti P.A., Kraus S. and Subrahmanian V. (1995). Foundations of secure deductive databases. IEEE Trans. Knowl. Data Eng. 7(3): 406\u2013422","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"6","key":"37_CR9","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/69.895801","volume":"12","author":"A. Brodsky","year":"2000","unstructured":"Brodsky A., Farkas C. and Jajodia S. (2000). Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl.Data Eng. 12(6): 900\u2013919","journal-title":"IEEE Trans. Knowl.Data Eng."},{"key":"37_CR10","unstructured":"Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. ACM Press (1995)"},{"key":"37_CR11","unstructured":"Denning, D.: Cryptography and Data Security. Addison-Wesley (1982)"},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning About Knowledge. MIT Press (1995)","DOI":"10.7551\/mitpress\/5803.001.0001"},{"issue":"2","key":"37_CR13","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C. Farkas","year":"2002","unstructured":"Farkas C. and Jajodia S. (2002). The inference problem: a survey. SIGKDD Explorations 4(2): 6\u201311","journal-title":"SIGKDD Explorations"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Leiss, E.L.: Principles of Data Security. Plenum Press (1982)","DOI":"10.1007\/978-1-4684-4316-5"},{"issue":"6","key":"37_CR15","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1109\/32.55088","volume":"16","author":"T.F. Lunt","year":"1990","unstructured":"Lunt T.F., Denning D.E., Schell R.R., Heckman M. and Shockley W.R. (1990). The seaview security model. IEEE Trans. Softw. Eng. 16(6): 593\u2013607","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"37_CR16","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1109\/69.591453","volume":"9","author":"X. Qian","year":"1997","unstructured":"Qian X. and Lunt T.F. (1997). A semantic framework of the multilevel secure relational model. IEEE Trans. Knowl. Data Eng. 9(2): 292\u2013301","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1):41\u201359 http:\/\/doi.acm.org\/10.1145\/319830.319833 (1983)","DOI":"10.1145\/319830.319833"},{"key":"37_CR18","unstructured":"University of Dortmund, Information Systems and Security: Controlled Query Evaluation for incomplete databases, prototype implementation. http:\/\/ls6-www.cs.uni-dortmund.de\/ issi\/projects\/cqe\/"},{"key":"37_CR19","unstructured":"Wang, L., Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: IEEE Symposium on Security and Privacy, pp. 161\u2013178. IEEE Computer Society (2004)"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Wang, L., Li, Y., Wijesekera, D., Jajodia, S.: Precisely answering multi-dimensional range queries without privacy breaches. In: Snekkenes, E., Gollmann, D.(eds.) ESORICS, Lecture Notes in Computer Science, vol. 2808, pp. 100\u2013115. Springer (2003)","DOI":"10.1007\/978-3-540-39650-5_6"},{"issue":"4","key":"37_CR21","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1145\/195664.195675","volume":"19","author":"M. Winslett","year":"1994","unstructured":"Winslett M., Smith K. and Qian X. (1994). Formal query languages for secure relational databases. ACM Trans. Database Syst. 19(4): 626\u2013662","journal-title":"ACM Trans. Database Syst."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-007-0037-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-007-0037-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-007-0037-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T04:21:47Z","timestamp":1737346907000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-007-0037-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,7]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2008,6]]}},"alternative-id":["37"],"URL":"https:\/\/doi.org\/10.1007\/s10207-007-0037-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,8,7]]}}}