skip to main content
article
Free access

Secure databases: protection against user influence

Published: 01 March 1979 Publication History

Abstract

Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.

References

[1]
CODD, E.F. A relational model of data for large and shared data banks. Comm ACM 13, 6 (June 1970}, 377-387.
[2]
DEMILLO, R., DOBKIN, D., ANt) LIPTON, R. Even data bases that lie can be compromised. IEEE Trans. Software Eng. SE-4, 1 (1978), 73-75.
[3]
DENNING, D.E. A lattice model of secure information flow. Comm. ACM 19, 5 (May 1976), 236-243.
[4]
FENTON, J.S. Memoryless subsystems. Comptr. J. 17, 2 (1974), 143-147.
[5]
GaAHAM, G.S., AND DENNING, P.J. Protection--principles and practice. Proc. AFIPS I972 SJCC, Vol. 40, AFIPS Press, Montvale, N.J., pp. 417-429.
[6]
HAQ, M. Insuring individuals' privacy from statistical data base users. Proc. AFIPS 1975 NCC, Vol. 43, AFIPS Press, Montvale, N.J., pp. 941-946.
[7]
HOFFMAN, L.J., AND MILLER, W.F. Getting a personal dossier from a statistical data bank. Datamation 16, 5 (May I970}, 74-75.
[8]
JONES, A.K., AND LIPTON, R.J. The enforcement of security policies for computation. Proc. 5th Syrup. Oper. Syst. Principles. Oper. SysL Rev. (ACM) 9, 5 (1975), 197-206.
[9]
JONES, A.K., AND WULF, W.A. Towards the design of secure systems. Software--Practices and Experience 5, 4 (Oct. 1975), 321-336.
[10]
LAMPSON, B.W. Protection. Proc. 5th Princeton Symp. Inform. Sci. and Syst., 1971, pp. 437-443.
[11]
ORGANICK, E.I. The MULTICS System: An Examination of Its Structure. M.I.T. Press, Cambridge, Mass., 1972.
[12]
WULF, W.A., ET AL. HYDRA: The kernel of a multiprocessor system. Comm. ACM 17, 6 (June 1974), 337-345.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Database Systems
ACM Transactions on Database Systems  Volume 4, Issue 1
March 1979
131 pages
ISSN:0362-5915
EISSN:1557-4644
DOI:10.1145/320064
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 1979
Published in TODS Volume 4, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. compromise
  2. database
  3. inference
  4. information flow
  5. protection
  6. security
  7. statistical query

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)95
  • Downloads (Last 6 weeks)16
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media