Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures

@article{Brodsky2000SecureDC,
  title={Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures},
  author={Alexander Brodsky and Csilla Farkas and Sushil Jajodia},
  journal={IEEE Trans. Knowl. Data Eng.},
  year={2000},
  volume={12},
  pages={900-919}
}
ÐThis paper investigates the problem of inference channels that occur when database constraints are combined with nonsensitive data to obtain sensitive information. We present an integrated security mechanism, called the Disclosure Monitor, which guarantees data confidentiality by extending the standard mandatory access control mechanism with a Disclosure Inference Engine. The Disclosure Inference Engine generates all the information that can be disclosed to a user based on the user's past and… CONTINUE READING
Highly Cited
This paper has 169 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 92 extracted citations

Secure Data Outsourcing with Adversarial Data Dependency Constraints

2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS) • 2016
View 6 Excerpts
Highly Influenced

Database Systems for Advanced Applications

Lecture Notes in Computer Science • 2014
View 11 Excerpts
Highly Influenced

Protecting Sensitive Business Information While Sharing Serial-Level Data

2008 12th Enterprise Distributed Object Computing Conference Workshops • 2008
View 3 Excerpts
Highly Influenced

170 Citations

01020'02'05'09'13'17
Citations per Year
Semantic Scholar estimates that this publication has 170 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 16 references

and S

A. Brodsky, C. Farkas
Jajodia, aData Disclosure and Inference Channels,o technical report, George Mason Univ. • 2000

C

S. Dawson, S. De
di Vimercati, and P. Samarati, aSpecification and Enforcement of Classification and Inference Constraints,o Proc. IEEE Symp. Security and Privacy • 1999
View 2 Excerpts

aInference in MLS Database Systems,o

D. G. Marks
IEEE Trans. Knowledge and Data Eng., • 1996

and A

T. H. Hinke, H. S. Delugach
Chandrasekhar, aA Fast Algorithm for Detecting Second Paths in Database Inference Analysis,o J. Computer Security, vol. 3, nos. 2 and 3, pp. 147±168 • 1995
View 1 Excerpt

A fast algorithm for detectingsecond paths in database inference analysis

Harry S. Delugach, Asha Chandrasekhar.
IEEE Trans . Knowledgeand Data Eng • 1991

Extending the Brewer-Nash Model to a Multilevel Context

IEEE Symposium on Security and Privacy • 1990
View 1 Excerpt

aModeling Security-Relevant Data Semantics,o

G. W. Smith
Proc. IEEE Symp. Research in Security and Privacy, • 1990
View 2 Excerpts

Similar Papers

Loading similar papers…