Sciweavers

11 search results - page 1 / 3
» Constraints, Inference Channels and Secure Databases
Sort
View
CP
2000
Springer
13 years 8 months ago
Constraints, Inference Channels and Secure Databases
Alexander Brodsky, Csilla Farkas, Duminda Wijeseke...
CP
2000
Springer
13 years 8 months ago
Automatic Generation of Propagation Rules for Finite Domains
plexity Theorems: Talk Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 David McAllester Regular Papers Automatic Generation of Propagation Rules for F...
Slim Abdennadher, Christophe Rigotti
TKDE
2008
122views more  TKDE 2008»
13 years 4 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
SIGKDD
2002
172views more  SIGKDD 2002»
13 years 4 months ago
Data Mining, National Security, Privacy and Civil Liberties
In this paper, we describe the threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases. Keywor...
Bhavani M. Thuraisingham
DMKD
2003
ACM
108views Data Mining» more  DMKD 2003»
13 years 9 months ago
Dynamic inference control
An inference problem exists in a multilevel database if knowledge of some objects in the database allows information with a higher security level to be inferred. Many such inferen...
Jessica Staddon