A sound and complete model-generation procedure for consistent and confidentiality-preserving databases
From MaRDI portal
(Redirected from Publication:549726)
Recommendations
Cites work
- scientific article; zbMATH DE number 1614697 (Why is no real title available?)
- scientific article; zbMATH DE number 1696845 (Why is no real title available?)
- scientific article; zbMATH DE number 3915608 (Why is no real title available?)
- scientific article; zbMATH DE number 140403 (Why is no real title available?)
- scientific article; zbMATH DE number 1301750 (Why is no real title available?)
- scientific article; zbMATH DE number 837700 (Why is no real title available?)
- scientific article; zbMATH DE number 3415409 (Why is no real title available?)
- A Machine-Oriented Logic Based on the Resolution Principle
- A formal analysis of information disclosure in data exchange
- An authorization model and its formal semantics
- Answer sets for consistent query answering in inconsistent databases
- Automated Deduction – CADE-20
- Combining Consistency and Confidentiality Requirements in First-Order Databases
- Controlled query evaluation for known policies by combining lying and refusal
- Controlled query evaluation with open queries for a decidable relational submodel
- Cover story management
- Data Privacy for $\mathcal{ALC}$ Knowledge Bases
- Data exchange: semantics and query answering
- Domain independence and the relational calculus
- Encyclopedia of Database Systems
- Inconsistency Tolerance
- On the expressive power of database queries with intermediate types
- Propositional belief base update and minimal change
- Secure data management in decentralized systems
- The classical decision problem.
- The model evolution calculus as a first-order DPLL method
Cited in
(8)- Approximate keys and functional dependencies in incomplete databases with limited domains
- Privacy preserving database generation for database application testing
- The impossibility of keeping secrets
- Confidentiality vs integrity in secure databases
- Controlled query evaluation in description logics through consistent query answering
- Inference-proof updating of a weakened view under the modification of input parameters
- Combining Consistency and Confidentiality Requirements in First-Order Databases
- Constrained obfuscation of relational databases
This page was built for publication: A sound and complete model-generation procedure for consistent and confidentiality-preserving databases
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q549726)