Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: DBSEC 2009
Guest editors: Jaideep VaidyaGuest Editor and Ehud GudesGuest Editor
Article type: Research Article
Authors: Biskup, Joachim; * | Gogolin, Christian | Seiler, Jens | Weibert, Torben
Affiliations: Fakultät für Informatik, Technische Universität Dortmund, Dortmund, Germany. E-mails: [email protected], [email protected], [email protected], [email protected]
Correspondence: [*] Corresponding author.
Abstract: Inference control aims at disabling a participant to gain a piece of information to be kept confidential. Considering a server–client architecture for information systems, we extend Controlled Query Evaluation (CQE), an inference control method to enforce confidentiality in static information systems under queries, to databases that are updatable by a client. More specifically, within the framework of the lying approach to CQE, we study how the server should translate a view update request issued by a client into a new database state in an inference-proof way. In order to avoid dangerous inferences, some such updates have to be denied even though the new database instance would be compatible with the set of integrity constraints declared in the schema and supposed to be known to the client. In contrast, seen from the client's point of view some other updates leading to an incompatible instance should not be denied. We design a control method to resolve this seemingly paradoxical situation and then prove that the general security definitions of CQE, suitably extended to capture both query evaluation and view update processing, and other properties linked to view updates hold. Moreover, we further enhance that control method by adding an inference-proof subprotocol for refreshing the views of the other clients. To ensure inference-proofness, from the other clients' point of view, any view update might be a transaction, i.e., a sequence of elementary updates.11This article extends, elaborates and clarifies our contribution [12] to DBSec 2009 and also comprises some results of our work [9] presented at ESORICS 2009.
Keywords: A priori knowledge, confidentiality policy, controlled execution, controlled query evaluation, inference control, inference-proof, information system, integrity constraint, lying approach, propositional logic, reversibility, security, transaction, view refreshment, view update
DOI: 10.3233/JCS-2011-0420
Journal: Journal of Computer Security, vol. 19, no. 3, pp. 487-529, 2011
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]