{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:04Z","timestamp":1773655864171,"version":"3.50.1"},"reference-count":33,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1016\/s0167-4048(97)87607-9","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T15:13:42Z","timestamp":1027610022000},"page":"687-708","source":"Crossref","is-referenced-by-count":33,"title":["Protecting databases from inference attacks"],"prefix":"10.1016","volume":"16","author":[{"given":"Thomas H.","family":"Hinke","sequence":"first","affiliation":[]},{"given":"Harry S.","family":"Delugach","sequence":"additional","affiliation":[]},{"given":"Randall P.","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(97)87607-9_BIB1","series-title":"Database Security VII: Status and Prospects","article-title":"Layered Knowledge Chunks for Database Inference","author":"Hinke","year":"1994"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB2","series-title":"ACM Transactions of Database Systems","article-title":"The Entity-Relationship Model \u2014 Toward a Unified View of Data","author":"Chen","year":"1976"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB3","series-title":"Database Security VI: Status and Prospects","article-title":"AERIE: An Inference Modeling and Detection Approach For Databases","author":"Hinke","year":"1993"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB4","series-title":"Proceedings 1988 IEEE Symposium on Security and Privacy","article-title":"Controlling Logical Inference in Multilevel Database Systems","author":"Morgenstern","year":"1988"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB5","series-title":"Proceedings of SIGMOD (ACM Special Interest Group on Management of Data)","article-title":"Security and Inference in Multilevel Database and Knowledge-Base Systems","author":"Morgenstern","year":"1987"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB6","series-title":"Proceedings IFIP Working Group 11.3 Workshop on Database Security","article-title":"Database Inference Engine Design Approach","author":"Hinke","year":"1988"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB7","series-title":"Proceedings 1988 IEEE Symposium on Security and Privacy","article-title":"Inference Aggregation Detection In Database Management Systems","author":"Hinke","year":"1988"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB8","series-title":"Proceedings 1988 IEEE Computer Society Symposium on Research in Security and Privacy","article-title":"The SeaView Security Model","author":"Denning","year":"1988"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB9","series-title":"Operating System Security Course","author":"Schaefer","year":"1995"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB10","article-title":"Essay 11: Penetration Testing, in Information Security: An Integrated Collection of Essays","author":"Weissman","year":"1995"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB11","author":"Bisby","year":"1978"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB12","series-title":"Department of Defense Standard: Department of Defense Trusted Computer System Evaluation Criteria","author":"Center N.C.S.","year":"1985"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB13","series-title":"Data-base Security II: Status and Prospects","article-title":"Database Inference Engine Design Approach","author":"Hinke","year":"1990"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB14","series-title":"Database Security, VI: Status and Prospects","article-title":"Inference Through Secondary Path Analysis","author":"Binns","year":"1993"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB15","series-title":"Proceedings of the Sixth IFIP 11.3 Working Conference on Database Security","article-title":"Inference Through Secondary Path Analysis","author":"Binns","year":"1992"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB16","series-title":"Proceedings of the IFIP WG 11.3 Seventh Annual Working Conference on Database Security","article-title":"Implementation Considerations for Inference Detection: Intended vs. Actual Classification","author":"Binns","year":"1993"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB17","series-title":"Database Security, VII: Status and Prospects","article-title":"Implementation Considerations for Inference Detection: Intended vs. Actual Classification","author":"Binns","year":"1994"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB18","series-title":"Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy","article-title":"Detection and Elimination of Inference Channels in Multilevel Relational Database Systems","author":"Qian","year":"1993"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB19","series-title":"IEEE Transactions on Knowledge and Data Engineering","article-title":"Multivalued Dependency Inferences in Multilevel Relational Database Systems","author":"Su","year":"1991"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB20","series-title":"Database Security III: Status and Prospects","article-title":"Multivalued Dependency Inferences in Multilevel Relational Database Systems","author":"Su","year":"1990"},{"issue":"2","key":"10.1016\/S0167-4048(97)87607-9_BIB21","doi-asserted-by":"crossref","first-page":"147","DOI":"10.3233\/JCS-1994\/1995-32-304","article-title":"A Fast Algorithm For Detecting Second Paths in Database Inference Analysis","volume":"3","author":"Hinke","year":"1995","journal-title":"Journal of Computer Security"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB22","series-title":"Fundamentals of Database Systems, Second Edition","author":"Elmasri","year":"1984"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB23","volume":"Volume 1","author":"Ullman","year":"1988","journal-title":"Principles of Database and Knowledge-base Systems"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB24","series-title":"Secure Computer Systems: Unified Exposition and Multics Interpretation","author":"Bell","year":"1976"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB25","series-title":"SRI RADC Database","author":"Garvey","year":"1993"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB26","series-title":"Proceedings of the Fourth IFIP Aerospace Computer Security Applications Conference","article-title":"Toward a Multilevel Relational Data Language","author":"Lunt","year":"1988"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB27","series-title":"Multivariate Analysis: Methods and Applications","author":"Dillon","year":"1984"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB28","series-title":"ACM Transactions of Database Systems","article-title":"The Tracker: A Threat to Statistical Database Security","author":"Denning","year":"1979"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB29","series-title":"Database Security III: Status and Prospects","article-title":"Database Inference Controller","author":"Buczkowski","year":"1990"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB30","series-title":"Database Security Volume X: Status and Prospects","first-page":"229","article-title":"A Framework for Inference-Directed Data Mining","author":"Hinke","year":"1997"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB31","author":"Rumbaugh","year":"1988","journal-title":"Unified Modeling Language Reference Manual"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB32","series-title":"Database Security IX: Status and Prospects","article-title":"A Tool for Inference Detection and Knowledge Discovery in Databases","author":"Rath","year":"1996"},{"key":"10.1016\/S0167-4048(97)87607-9_BIB33","series-title":"Proceedings of the 17th National Computer Security Conference","article-title":"An Inference Paradigm","author":"Marks","year":"1994"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404897876079?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404897876079?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T11:59:19Z","timestamp":1556366359000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404897876079"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":33,"journal-issue":{"issue":"8","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["S0167404897876079"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(97)87607-9","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}