Protection of Information in Relational Data Bases.
François Bancilhon, Nicolas Spyratos:
Protection of Information in Relational Data Bases.
VLDB 1977: 494-500@inproceedings{DBLP:conf/vldb/BancilhonS77,
author = {Fran\c{c}ois Bancilhon and
Nicolas Spyratos},
title = {Protection of Information in Relational Data Bases},
booktitle = {Proceedings of the Third International Conference on Very Large
Data Bases, October 6-8, 1977, Tokyo, Japan},
publisher = {IEEE Computer Society},
year = {1977},
pages = {494-500},
ee = {db/conf/vldb/BancilhonS77.html},
crossref = {DBLP:conf/vldb/77},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Abstract
This paper is concerned with protection of information in relational databases from disclosure to
properly identified users. It is assumed that the only means of access to the database is through a relational query language.
The objective of the paper is to formalize the notion of protection. We first describe the information content of the database by a set of propositions and their truth values. The objects to be protected are (the truth values of) certain propositions that have been declared confidential. A query violates
a protected proposition if its answer modifies the knowledge of tHe user about (the truth value of) this proposition.
Following this approach, we propose a model for evaluating protection systems. In this model a protection system is characterized by the type of queries it takes as its input, the type of data it can protect, the means of protection against queries (e.g. rejection or modification) and the type of protection it provides (e.g., total protection, partial protection, protection against user's inference).
Some examples of the use of the model as a tool for analysis are given.
Copyright © 1977 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...
Printed Edition
Proceedings of the Third International Conference on Very Large Data Bases, October 6-8, 1977, Tokyo, Japan.
IEEE Computer Society 1977
Contents
References
- [1]
- Morton M. Astrahan, Donald D. Chamberlin:
Implementation of a Structured English Query Language.
Commun. ACM 18(10): 580-588(1975)
- [2]
- ...
- [3]
- E. F. Codd:
Further Normalization of the Data Base Relational Model.
IBM Research Report, San Jose, California RJ909: (1971)
- [4]
- E. F. Codd:
Relational Completeness of Data Base Sublanguages.
In: R. Rustin (ed.): Database Systems: 65-98, Prentice Hall and IBM Research Report RJ 987, San Jose, California : (1972)
- [5]
- Richard A. DeMillo, David P. Dobkin, Richard J. Lipton:
Even Data Bases That Lie Can Be Compromised.
IEEE Trans. Software Eng. 4(1): 73-75(1978)
- [6]
- David P. Dobkin, Anita K. Jones, Richard J. Lipton:
Secure Databases: Protection Against User Influence.
ACM Trans. Database Syst. 4(1): 97-106(1979)
- [7]
- Patricia P. Griffiths, Bradford W. Wade:
An Authorization Mechanism for a Relational Database System.
ACM Trans. Database Syst. 1(3): 242-255(1976)
- [8]
- ...
- [9]
- ...
- [10]
- John B. Kam, Jeffrey D. Ullman:
A Model of Statistical Databases and Their Security.
ACM Trans. Database Syst. 2(1): 1-10(1977)
- [11]
- Richard C. Owens Jr.:
Evaluation of Access Authorization Characteristics of Derived Data Sets.
SIGFIDET Workshop 1971: 263-278
- [12]
- ...
- [13]
- ...
Copyright © Tue Mar 16 02:21:55 2010
by Michael Ley (ley@uni-trier.de)