AbstractThis article introduces and investigates a new model-theoretic mechanism to enforce confidentiality (or privacy) requirements in a database instance; at the same time it ensures maximum availability of correct database answers. The aim is to materialize and publish a secure view that satisfies the properties of “inference-proofness” and “distortion minimality”. A comprehensive class of first-order constraints (representing a user’s a priori knowledge and a confidentiality policy) can be handled by the presented algorithm in a sound and complete way: tuple-generating dependencies, denial constraints and existential constraints. The due proof of refutation soundness makes use of Herbrand’s theorem and semantic trees
We may want to keep sensitive information in a relational database hidden from a user or group there...
AbstractWe perform a theoretical study of the following query-view security problem: given a view V ...
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but...
AbstractThis article introduces and investigates a new model-theoretic mechanism to enforce confiden...
This dissertation investigates a mechanism for confidentiality preservation in first-order logic dat...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
A universal model of a database D and a set Σ of integrity constraints is a database that extends D,...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
In a simplified secured database access model, privileged group and public group can access data wit...
A practical model and an associated method are developed for providing consistent, deterministically...
The emphasis in database privacy should fall on a balance between confidentiality, integrity and ava...
Part 3: Confidentiality and PrivacyInternational audienceInference control of queries for relational...
Nowadays the whole world is immersed in data. Starting from creating the data, using the data, shari...
Companies and organizations collect and use vast troves of sensitive user data whose release must be...
We may want to keep sensitive information in a relational database hidden from a user or group there...
AbstractWe perform a theoretical study of the following query-view security problem: given a view V ...
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but...
AbstractThis article introduces and investigates a new model-theoretic mechanism to enforce confiden...
This dissertation investigates a mechanism for confidentiality preservation in first-order logic dat...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
A universal model of a database D and a set Σ of integrity constraints is a database that extends D,...
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted...
In a simplified secured database access model, privileged group and public group can access data wit...
A practical model and an associated method are developed for providing consistent, deterministically...
The emphasis in database privacy should fall on a balance between confidentiality, integrity and ava...
Part 3: Confidentiality and PrivacyInternational audienceInference control of queries for relational...
Nowadays the whole world is immersed in data. Starting from creating the data, using the data, shari...
Companies and organizations collect and use vast troves of sensitive user data whose release must be...
We may want to keep sensitive information in a relational database hidden from a user or group there...
AbstractWe perform a theoretical study of the following query-view security problem: given a view V ...
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but...