{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T02:12:41Z","timestamp":1692238361035},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,2,27]],"date-time":"2016-02-27T00:00:00Z","timestamp":1456531200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s10207-016-0322-4","type":"journal-article","created":{"date-parts":[[2016,2,27]],"date-time":"2016-02-27T05:24:21Z","timestamp":1456550661000},"page":"75-89","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An extended access control mechanism exploiting data dependencies"],"prefix":"10.1007","volume":"16","author":[{"given":"Davide Alberto","family":"Albertini","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Carminati","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,27]]},"reference":[{"key":"322_CR1","doi-asserted-by":"crossref","unstructured":"Bender, G., Kot, L., Gehrke, J.: Explainable security for relational databases. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data (2014)","DOI":"10.1145\/2588555.2593663"},{"key":"322_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01890-9","volume-title":"Data Protection from Insider Threats. Synthesis Lecture on Data Management","author":"E Bertino","year":"2012","unstructured":"Bertino, E.: Data Protection from Insider Threats. Synthesis Lecture on Data Management. Morgan & Claypool, San Rafael (2012)"},{"key":"322_CR3","doi-asserted-by":"crossref","unstructured":"Bishop, M., Engle, S., Peisert, S., Whalen, S., Gates, C.: We have met the enemy and he is us. In: Proceedings of the 2008 Workshop on New Security Paradigms (2008)","DOI":"10.1145\/1595676.1595678"},{"key":"322_CR4","doi-asserted-by":"crossref","unstructured":"Biskup, J., Embley, D.W., Lochner, J.-H.: Reducing inference control to access control for normalized database schemas. Inf. Process. Lett. 106(1):8\u201312 (2008)","DOI":"10.1016\/j.ipl.2007.09.007"},{"key":"322_CR5","doi-asserted-by":"crossref","unstructured":"Biskup, J., Hartmann, S., Link, S., Lochner, J.-H.: Efficient inference control for open relational queries. In: Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (2010)","DOI":"10.1007\/978-3-642-13739-6_11"},{"key":"322_CR6","doi-asserted-by":"crossref","unstructured":"Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng. 12(6):900\u2013919 (2000)","DOI":"10.1109\/69.895801"},{"key":"322_CR7","doi-asserted-by":"crossref","unstructured":"Delugach, H.S., Hinke, T.H.: Wizard: a database inference analysis and detection system. IEEE Trans. Knowl. Data Eng. 8(1):56\u201366 (1996)","DOI":"10.1109\/69.485629"},{"key":"322_CR8","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: Commutative filters for reducing inference threats in multilevel database systems. In: Security and Privacy, 1985 IEEE Symposium on (1985)","DOI":"10.1109\/SP.1985.10017"},{"key":"322_CR9","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: Annual Review of Computer Science: Vol. 3, chapter Database Security (1988)","DOI":"10.1146\/annurev.cs.03.060188.000245"},{"key":"322_CR10","doi-asserted-by":"crossref","unstructured":"Farkas, C., Jajodia, S.: The inference problem: a survey. ACM SIGKDD Explor. Newsl. 4(2):6\u201311 (2002)","DOI":"10.1145\/772862.772864"},{"key":"322_CR11","doi-asserted-by":"crossref","unstructured":"Hale, J., Shenoi, S.: Catalytic inference analysis: detecting inference threats due to knowledge discovery. In: Security and Privacy, 1997. Proceedings, 1997 IEEE Symposium on (1997)","DOI":"10.1109\/SECPRI.1997.601333"},{"key":"322_CR12","doi-asserted-by":"crossref","unstructured":"Morgenstern, M.: Controlling logical inference in multilevel database systems. In: Proceedings of the 1988 IEEE Conference on Security and Privacy (1988)","DOI":"10.1109\/SECPRI.1988.8116"},{"key":"322_CR13","doi-asserted-by":"crossref","unstructured":"Qian, X., Stickel, M. E., Karp, P. D., Lunt, T. F., Carvey, T. D.: Detection and elimination of inference channels in multilevel relational database systems. In: Proceedings of the 1993 IEEE Symposium on Security and Privacy (1993)","DOI":"10.1109\/RISP.1993.287632"},{"key":"322_CR14","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data (2004)","DOI":"10.1145\/1007568.1007631"},{"key":"322_CR15","doi-asserted-by":"crossref","unstructured":"Thuraisingham, B.M.: Security checking in relational database management systems augmented with inference engines. Comput. Secur. 6(6):479\u2013492 (1987)","DOI":"10.1016\/0167-4048(87)90029-0"},{"key":"322_CR16","doi-asserted-by":"crossref","unstructured":"Thuraisingham, B.M.: Security issues for data warehousing and data mining. In: Proceedings of the Tenth Annual IFIP TC11\/WG11.3 International Conference on Database Security: Volume X: Status and Prospects: Status and Prospects (1997)","DOI":"10.1007\/978-0-387-35167-4_2"},{"key":"322_CR17","doi-asserted-by":"crossref","unstructured":"Toland, T.S., Farkas, C., Eastman, C. M.: The inference problem: maintaining maximal availability in the presence of database updates. Comput. Secur. 29(1):88\u2013103 (2010)","DOI":"10.1016\/j.cose.2009.07.004"},{"key":"322_CR18","unstructured":"Wang, Q., Yu, T., Li, N., Lobo, J., Bertino, E., Irwin, K., Byun, J.-W.: On the correctness criteria of fine-grained access control in relational databases. In: Proceedings of the 33rd International Conference on Very Large Data Bases (2007)"},{"key":"322_CR19","doi-asserted-by":"crossref","unstructured":"Woodruff, D., Staddon, J.: Private inference control. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (2004)","DOI":"10.1145\/1030083.1030109"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-016-0322-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-016-0322-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-016-0322-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-016-0322-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T01:48:00Z","timestamp":1692236880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-016-0322-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,27]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["322"],"URL":"https:\/\/doi.org\/10.1007\/s10207-016-0322-4","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,27]]}}}