Abstract. Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and infer sensitive information from a series of seemingly innocuous data access. In this paper, we proposed a detection system that utilizes both the user’s current query and past query log to determine if the current query answer can infer sensitive information. A semantic inference model (SIM) is constructed based on the data dependency, database schema and semantic relationship among data. After the SIM is instantiated via specific instances, it can then be mapped to a Bayesian network and used for evaluating the inference probability. The decision of answ...
We focus on automatic anomaly detection in SQL databases for security systems.\u3cbr/\u3eMany logs o...
Research in Controlling Inference in statistical databases (SDBs) has been under way for over 20 yea...
Abstract. The database server is a crucial bottleneck in traditional inference con-trol architecture...
International audienceNowadays, users are permanently prompted to create web accounts when they buy ...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
International audienceNowadays applications produce and manage data of individual among which some m...
Despite protected by firewalls and network security systems, databases are vulnerable to attacks esp...
Most of valuable information resources for any organization are stored in the database; it is a seri...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
Access control can be used to ensure that database queries pertaining to sensitive information are n...
AbstractA statistical database (SDB) is a database that is used to provide simple. summary statistic...
Abstract: An Inference attack occurs when a user is able to infer some information about a database...
International audienceThe omnipresence of services offered by diverse applications leads customers t...
The basic inference problem is defined as follows: For a finite set X equals left brace x//1,. . . ,...
We focus on automatic anomaly detection in SQL databases for security systems.\u3cbr/\u3eMany logs o...
Research in Controlling Inference in statistical databases (SDBs) has been under way for over 20 yea...
Abstract. The database server is a crucial bottleneck in traditional inference con-trol architecture...
International audienceNowadays, users are permanently prompted to create web accounts when they buy ...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
Today’s databases store information with sensitivity levels that range from public to highly sensiti...
International audienceNowadays applications produce and manage data of individual among which some m...
Despite protected by firewalls and network security systems, databases are vulnerable to attacks esp...
Most of valuable information resources for any organization are stored in the database; it is a seri...
AbstractMost of valuable information resources for any organization are stored in the database; it i...
Access control can be used to ensure that database queries pertaining to sensitive information are n...
AbstractA statistical database (SDB) is a database that is used to provide simple. summary statistic...
Abstract: An Inference attack occurs when a user is able to infer some information about a database...
International audienceThe omnipresence of services offered by diverse applications leads customers t...
The basic inference problem is defined as follows: For a finite set X equals left brace x//1,. . . ,...
We focus on automatic anomaly detection in SQL databases for security systems.\u3cbr/\u3eMany logs o...
Research in Controlling Inference in statistical databases (SDBs) has been under way for over 20 yea...
Abstract. The database server is a crucial bottleneck in traditional inference con-trol architecture...