Secure databases
- 1 March 1979
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Database Systems
- Vol. 4 (1), 97-106
- https://doi.org/10.1145/320064.320068
Abstract
Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.Keywords
This publication has 8 references indexed in Scilit:
- Even Data Bases That Lie Can Be CompromisedIEEE Transactions on Software Engineering, 1978
- A lattice model of secure information flowCommunications of the ACM, 1976
- The enforcement of security policies for computationACM SIGOPS Operating Systems Review, 1975
- The enforcement of security policies for computationPublished by Association for Computing Machinery (ACM) ,1975
- HYDRACommunications of the ACM, 1974
- Memoryless subsystemsThe Computer Journal, 1974
- ProtectionPublished by Association for Computing Machinery (ACM) ,1971
- A relational model of data for large shared data banksCommunications of the ACM, 1970