skip to main content
article
Free access

Secure databases: protection against user influence

Published: 01 March 1979 Publication History

Abstract

Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.

References

[1]
CODD, E.F. A relational model of data for large and shared data banks. Comm ACM 13, 6 (June 1970}, 377-387.
[2]
DEMILLO, R., DOBKIN, D., ANt) LIPTON, R. Even data bases that lie can be compromised. IEEE Trans. Software Eng. SE-4, 1 (1978), 73-75.
[3]
DENNING, D.E. A lattice model of secure information flow. Comm. ACM 19, 5 (May 1976), 236-243.
[4]
FENTON, J.S. Memoryless subsystems. Comptr. J. 17, 2 (1974), 143-147.
[5]
GaAHAM, G.S., AND DENNING, P.J. Protection--principles and practice. Proc. AFIPS I972 SJCC, Vol. 40, AFIPS Press, Montvale, N.J., pp. 417-429.
[6]
HAQ, M. Insuring individuals' privacy from statistical data base users. Proc. AFIPS 1975 NCC, Vol. 43, AFIPS Press, Montvale, N.J., pp. 941-946.
[7]
HOFFMAN, L.J., AND MILLER, W.F. Getting a personal dossier from a statistical data bank. Datamation 16, 5 (May I970}, 74-75.
[8]
JONES, A.K., AND LIPTON, R.J. The enforcement of security policies for computation. Proc. 5th Syrup. Oper. Syst. Principles. Oper. SysL Rev. (ACM) 9, 5 (1975), 197-206.
[9]
JONES, A.K., AND WULF, W.A. Towards the design of secure systems. Software--Practices and Experience 5, 4 (Oct. 1975), 321-336.
[10]
LAMPSON, B.W. Protection. Proc. 5th Princeton Symp. Inform. Sci. and Syst., 1971, pp. 437-443.
[11]
ORGANICK, E.I. The MULTICS System: An Examination of Its Structure. M.I.T. Press, Cambridge, Mass., 1972.
[12]
WULF, W.A., ET AL. HYDRA: The kernel of a multiprocessor system. Comm. ACM 17, 6 (June 1974), 337-345.

Cited By

View all
  • (2020)Towards Matching User Mobility Traces in Large-Scale DatasetsIEEE Transactions on Big Data10.1109/TBDATA.2018.28716936:4(714-726)Online publication date: 1-Dec-2020
  • (2019)Incorrectness logicProceedings of the ACM on Programming Languages10.1145/33710784:POPL(1-32)Online publication date: 20-Dec-2019
  • (2018)Improving 3D NAND Flash Memory Lifetime by Tolerating Early Retention Loss and Process VariationACM SIGMETRICS Performance Evaluation Review10.1145/3292040.321965946:1(106-106)Online publication date: 12-Jun-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Database Systems
ACM Transactions on Database Systems  Volume 4, Issue 1
March 1979
131 pages
ISSN:0362-5915
EISSN:1557-4644
DOI:10.1145/320064
  • Editor:
  • David K. Hsiao
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 1979
Published in TODS Volume 4, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. compromise
  2. database
  3. inference
  4. information flow
  5. protection
  6. security
  7. statistical query

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)90
  • Downloads (Last 6 weeks)24
Reflects downloads up to 15 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Towards Matching User Mobility Traces in Large-Scale DatasetsIEEE Transactions on Big Data10.1109/TBDATA.2018.28716936:4(714-726)Online publication date: 1-Dec-2020
  • (2019)Incorrectness logicProceedings of the ACM on Programming Languages10.1145/33710784:POPL(1-32)Online publication date: 20-Dec-2019
  • (2018)Improving 3D NAND Flash Memory Lifetime by Tolerating Early Retention Loss and Process VariationACM SIGMETRICS Performance Evaluation Review10.1145/3292040.321965946:1(106-106)Online publication date: 12-Jun-2018
  • (2018)Distributed Statistical Machine Learning in Adversarial SettingsACM SIGMETRICS Performance Evaluation Review10.1145/3292040.321965546:1(96-96)Online publication date: 12-Jun-2018
  • (2018)Working Set Size Estimation Techniques in Virtualized EnvironmentsACM SIGMETRICS Performance Evaluation Review10.1145/3292040.321964246:1(62-63)Online publication date: 12-Jun-2018
  • (2018)Inherent Trade-Offs in Algorithmic FairnessACM SIGMETRICS Performance Evaluation Review10.1145/3292040.321963446:1(40-40)Online publication date: 12-Jun-2018
  • (2018)CASTLE: Enhancing the Utility of Inequality Query Auditing Without Denial ThreatsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2018.279780213:7(1656-1669)Online publication date: Jul-2018
  • (2017)Inference detection in statistical database using frequent pattern2017 International Conference on Communication and Signal Processing (ICCSP)10.1109/ICCSP.2017.8286741(1953-1956)Online publication date: Apr-2017
  • (2017)Securing Databases from Probabilistic Inference2017 IEEE 30th Computer Security Foundations Symposium (CSF)10.1109/CSF.2017.30(343-359)Online publication date: Aug-2017
  • (2016)Differentially private response mechanisms on categorical dataDiscrete Applied Mathematics10.1016/j.dam.2016.04.010211:C(86-98)Online publication date: 1-Oct-2016
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media