Selected results and related issues of confidentiality-preserving controlled interaction execution
DOI10.1007/978-3-319-30024-5_12zbMATH Open1475.68427OpenAlexW2472401858MaRDI QIDQ2807082FDOQ2807082
Authors: Joachim Biskup
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-30024-5_12
Recommendations
- Confidentiality policies and their enforcement for controlled query evaluation
- Controlled query evaluation for known policies by combining lying and refusal
- scientific article; zbMATH DE number 2080022
- The impossibility of keeping secrets
- Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control
confidentialityconstraint satisfactionproof theorybeliefcompletenessfirst-order logicinformation systemknowledgemodel theorytheorem provingquery answeringdistortionlyingmonitoringnon-monotonic reasoningguarded commandspolicyrelational databasea priori knowledgeinformation flow controlinference controlprogram executionweakeningrefusalcensorclient stateevaluated secrecyinteraction historypossibilistic secrecyrational reasoningsecurity automatonsecurity invariantupdate processingview publishing
Computing methodologies for information systems (hypertext navigation, interfaces, decision support, etc.) (68U35) Computer security (68M25)
Cited In (2)
This page was built for publication: Selected results and related issues of confidentiality-preserving controlled interaction execution
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807082)