{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:39Z","timestamp":1773655779221,"version":"3.50.1"},"reference-count":28,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.3103\/s0146411620080271","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T06:05:04Z","timestamp":1613628304000},"page":"829-833","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Inference Attacks and Information Security in Databases"],"prefix":"10.3103","volume":"54","author":[{"given":"A. A.","family":"Poltavtsev","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A. R.","family":"Khabarov","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"A. O.","family":"Selyankin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1627","published-online":{"date-parts":[[2021,2,18]]},"reference":[{"key":"7299_CR1","unstructured":"Baraani-Dastjerdi, A., Pieprzyk, J., Pieprzyk, B.-D.J., and Safavi-Naini, R., Security in Databases: A Survey Study, 1996, pp. 1\u201339."},{"key":"7299_CR2","doi-asserted-by":"publisher","first-page":"936","DOI":"10.3103\/S0146411617080193","volume":"51","author":"N.N. Shenets","year":"2017","unstructured":"Shenets, N.N., Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing, Autom.\u00a0Control Comput. Sci., 2017, vol. 51, no. 8, pp. 936\u2013946.","journal-title":"Autom.\u00a0Control Comput. Sci."},{"key":"7299_CR3","doi-asserted-by":"publisher","first-page":"2039","DOI":"10.1109\/JSYST.2016.2574719","volume":"12","author":"Q. Jiang","year":"2018","unstructured":"Jiang, Q., Ma, J., and Wei, F., On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services, IEEE Syst. J., 2018, vol. 12, no. 2, pp. 2039\u20132042. https:\/\/doi.org\/10.1109\/JSYST.2016.2574719","journal-title":"IEEE Syst. J."},{"key":"7299_CR4","doi-asserted-by":"publisher","unstructured":"Kalinin, M., Krundyshev, V., Rezedinova, E., and Zegzhda, P., Role-based access control for vehicular adhoc networks, 2018 IEEE International Black Sea Conference on Communications and Networking, 2018. https:\/\/doi.org\/10.1109\/BlackSeaCom.2018.8433628","DOI":"10.1109\/BlackSeaCom.2018.8433628"},{"key":"7299_CR5","doi-asserted-by":"publisher","first-page":"664","DOI":"10.3103\/S0146411616080095","volume":"50","author":"A.S. Konoplev","year":"2016","unstructured":"Konoplev, A.S. and Kalinin, M.O., Access control system for distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 664\u2013668.","journal-title":"Autom. Control Comput. Sci."},{"key":"7299_CR6","doi-asserted-by":"publisher","first-page":"669","DOI":"10.3103\/S0146411616080101","volume":"50","author":"A.S. Konoplev","year":"2016","unstructured":"Konoplev, A.S. and Kalinin, M.O., Tasks of providing information security in distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 669\u2013672.","journal-title":"Autom. Control Comput. Sci."},{"key":"7299_CR7","doi-asserted-by":"publisher","first-page":"743","DOI":"10.3103\/S0146411616080290","volume":"50","author":"A.G. Busygin","year":"2016","unstructured":"Busygin, A.G., Konoplev, A.S., and Kalinin, M.O., Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 743\u2013748.","journal-title":"Autom. Control Comput. Sci."},{"key":"7299_CR8","doi-asserted-by":"publisher","first-page":"739","DOI":"10.3103\/S0146411616080265","volume":"50","author":"E.B. Aleksandrova","year":"2016","unstructured":"Aleksandrova, E.B., Zegzhda, D.P., and Konoplev, A.S., Applying the group signature for entity authentication in distributed grid computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 739\u2013742.","journal-title":"Autom. Control Comput. Sci."},{"key":"7299_CR9","doi-asserted-by":"crossref","unstructured":"Keke, G., Longfei, Q., Min, C., Hui, Zh., and Meikang, Q., SA-EAST: Security-aware efficient data transmission for its in mobile heterogeneous cloud computing, ACM Trans. Embed. Comput. Syst., 2017, vol. 16, no. 2.","DOI":"10.1145\/2979677"},{"key":"7299_CR10","unstructured":"Volkov, S.D., Tsaregorodtsev, A.V., and Tsatskina, E.P., Features of building systems for detecting computer attacks for information and telecommunication systems operating on the basis of cloud computing technology, Ogarev-Online, 2017, no. 13."},{"key":"7299_CR11","doi-asserted-by":"publisher","unstructured":"Belenko, V., Chernenko, V., Kalinin, M., and Krundyshev, V., Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems, 2018 International Russian Automation Conference, RusAutoCon, 2018. https:\/\/doi.org\/10.1109\/RUSAUTOCON.2018.8501783","DOI":"10.1109\/RUSAUTOCON.2018.8501783"},{"key":"7299_CR12","doi-asserted-by":"publisher","unstructured":"Krundyshev, V. and Kalinin, M., Hybrid neural network frame work for detection of cyber attacks at smart infrastructures, ACM International Conference Proceeding Series, 2019. https:\/\/doi.org\/10.1145\/3357613.3357623","DOI":"10.1145\/3357613.3357623"},{"key":"7299_CR13","doi-asserted-by":"publisher","first-page":"954","DOI":"10.3103\/S0146411618080199","volume":"52","author":"T.D. Ovasapyan","year":"2018","unstructured":"Ovasapyan, T.D., Moskvin, D.A., and Kalinin, M.O., Using neural networks to detect internal intruders in vanets, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 954\u2013958.","journal-title":"Autom. Control Comput. Sci."},{"key":"7299_CR14","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M.A. and Khabarov, A.R., Database security: Problems and prospects, Program. Prod. Sist., 2016, no. 3, pp. 36\u201341. https:\/\/doi.org\/10.15827\/0236-235X.115.036-041","DOI":"10.15827\/0236-235X.115.036-041"},{"key":"7299_CR15","doi-asserted-by":"publisher","first-page":"734","DOI":"10.3103\/S014641161608023X","volume":"50","author":"P.D. Zegzhda","year":"2016","unstructured":"Zegzhda, P.D. and Kalinin, M.O., Technology of security services virtualization for high-speed computer networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 734\u2013738.","journal-title":"Autom. Control Comput. Sci."},{"key":"7299_CR16","doi-asserted-by":"publisher","first-page":"914","DOI":"10.3103\/S0146411619080273","volume":"53","author":"M.A. Poltavtseva","year":"2019","unstructured":"Poltavtseva, M.A., A consistent approach to building secure big data processing and storage systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 914\u2013921.","journal-title":"Autom. Control Comput. Sci."},{"key":"7299_CR17","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-2947-7.ch001","volume-title":"Big data and cloud computing: A review of supply chain capabilities and challenges","author":"M. Tanque","year":"2018","unstructured":"Tanque, M. and Foxwell, H.J., Big data and cloud computing: A review of supply chain capabilities and challenges, Exploring the Convergence of Big Data and the Internet of Things, 2018. https:\/\/doi.org\/10.4018\/978-1-5225-2947-7.ch001"},{"key":"7299_CR18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511844409","volume-title":"Data-Intensive Computing Architectures, Algorithms, and Applications","author":"I. Gorton","year":"2012","unstructured":"Gorton, I. and Gracio, D.K., Data-Intensive Computing Architectures, Algorithms, and Applications, Cambridge Press, 2012."},{"key":"7299_CR19","volume-title":"Database Systems: A Pragmatic Approach","author":"D. Elvis","year":"2016","unstructured":"Elvis, D. and Foster, C., Database Systems: A Pragmatic Approach, Apress, 2016."},{"key":"7299_CR20","doi-asserted-by":"publisher","first-page":"903","DOI":"10.3103\/S0146411619080261","volume":"53","author":"M.A. Poltavtseva","year":"2019","unstructured":"Poltavtseva, M.A., Zegzhda, D.P., and Kalinin, M.O., Big data management system security threat model, Autom.\u00a0Control Comput. Sci., 2019, vol. 53, no. 8, pp. 903\u2013913.","journal-title":"Autom.\u00a0Control Comput. Sci."},{"key":"7299_CR21","doi-asserted-by":"crossref","unstructured":"Yip, R.W. and Levitt, K.N., Data level inference detection in database systems, Proceedings of 11th IEEE Computer Security Foundations Workshop, Rockport, MA, 1988, pp. 179\u2013189.","DOI":"10.1109\/CSFW.1998.683168"},{"key":"7299_CR22","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1016\/S0167-4048(97)87607-9","volume":"16","author":"T.H. Hinke","year":"1997","unstructured":"Hinke, T.H., Delugach, H.S., and Wolf, R.P., Protecting databases from inference attacks, Comput. Secur., 1997, vol. 16, no. 8, pp. 687\u2013708.","journal-title":"Comput. Secur."},{"key":"7299_CR23","doi-asserted-by":"crossref","unstructured":"Yang, Y.J., Li, Y.J., and Deng, R.H., New paradigm of inference control with trusted computing, IFIP Annual Conference on Data and Applications Security and Privacy, Redondo Beach, CA, 2007, pp. 243\u2013258.","DOI":"10.1007\/978-3-540-73538-0_18"},{"key":"7299_CR24","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/0022-0000(90)90005-6","volume":"40","author":"G. Ozsoyoglu","year":"1990","unstructured":"Ozsoyoglu, G., On inference control in semantic data models for statistical databases, J. Comput. Syst. Sci., 1990, vol. 40, no. 3, pp. 405\u2013443.","journal-title":"J. Comput. Syst. Sci."},{"key":"7299_CR25","unstructured":"Hylkema, M., A Survey of Database Inference Attack Prevention Methods, Educ. Technol. Res., 2009."},{"key":"7299_CR26","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.ipl.2007.09.007","volume":"106","author":"J. Biskup","year":"2008","unstructured":"Biskup, J., Embley, D.W., and Lochner, J.H., Reducing inference control to access control for normalized database schemas, Inf. Process. Lett., 2008, vol. 106, no. 1, pp. 8\u201312.","journal-title":"Inf. Process. Lett."},{"key":"7299_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_40","volume-title":"Database security protection via inference detection","author":"Y. Chen","year":"2006","unstructured":"Chen, Y. and Chu, W., Database security protection via inference detection, Intelligence and Security Informatics, San Diego, CA, 2006, pp. 452\u2013458."},{"key":"7299_CR28","doi-asserted-by":"crossref","unstructured":"Goyal, V., Gupta, S.K., Singh, M., and Gupta, A., Auditing inference based disclosures in dynamic databases, Workshop on Secure Data Management, Auckland, 2008, pp. 67\u201381.","DOI":"10.1007\/978-3-540-85259-9_5"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080271.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411620080271","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411620080271.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:54Z","timestamp":1773612174000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411620080271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":28,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7299"],"URL":"https:\/\/doi.org\/10.3103\/s0146411620080271","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"2 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}