Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/170088.170122acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
Article
Free access

A dynamic knowledge based approach to the problem of deduction on a non-statistical multilevel secure database

Published: 01 December 1993 Publication History
First page of PDF

References

[1]
Adam, N.R. and Wortmann, J.C., "Security-Control Methods for Statistical Databases: A Comparitive Study", ACM Computing Surveys, Vol.21, No.4, December 1989.
[2]
Anderson, M.E., Response Evaluation in a Mixed-Initiative Dialogue Manager via the Computation of Conceptual Distance. Masters Thesis. The University of Connecticut, 1990.
[3]
Anderson, M.E. and Shin, D.G., "Integrating an Intelligent interface with a Relational Database for Two Way Man-Machine Communication", Proceedings of the IEEE/ACM International Conference on Developing and Managing Expert System Programs,Washington, D.C, 1991.
[4]
Bell, D. and LaPadula, L.J., "Secure Computer Systems: Mathematical Foundations & A Mathematical Model", Technical Report ESD-TR- 73-278, Vols. 1 &2, Electronic Systems Division, USAF, 1973.
[5]
Bislcup, J., "Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines", Database Security, III: Status and Prospects, Spooner, D.L. and Landwehr, C., editors, North-Holland, 1990.
[6]
Bonyun, D.A., "Using EXCESS as a Framework for Secure Databases", Database Security, III: Status and Prospects, Spooner, D.L. and Landwehr, C., editors, North-Holland, 1990.
[7]
Buczlcowski, L.J., "Database Inference Controller", Database Security, III: Status and Prospects, Spooner, D.L. and Landwehr, C., editors, North-Holland, 1990.
[8]
Denning, D.E. and Denning, P.E., "Data Security", Computing Surveys, Vol. 11, No. 3, September 1979.
[9]
Denning, D.E. and Schlorer, J., "Inference Controls for Staticfical Databases", Computer, July 1983
[10]
Haigh, J.T. et. al., "The LDV Approach to Database Security", Database Security, III.' Status and Prospects, Spooner, D.L. and Landwehr, C., editors, North-Holland, 1990.
[11]
Henning, R.R and Simonian, R.P., "Security Analysis of Database Schema Information", Database Security, H: Status and Prospects, Landwehr, C.E., editor, North-Holland, 1989.
[12]
Hinke, T.H., "Database Inference Engine Design Approach", Database Security, II: Status and Prospects, Landwehr, C.E., editor, North-Holland, 1989.
[13]
Ieong, I.T. and Ting, T.C., "An Analysis of Database Security with Queries for High Order Statistical Information", Database Security, II: Status and Prospects, Landwehr, C.E., editor, North-Holland, 1989.
[14]
Jajodia, S. et. al., "Audit Trail Organization in Relational Databases", Database Security, III: Status and Prospects, Stx>oner, D.L. and Landwehr, C., editors, North-Holland, 1990.
[15]
Matloff, N. and Tendick, P., "The 'Curse of Dimensionality' in Database Security", Database Security, H: Status and Prospects, Landwehr, C.E., editor, North-Holland, 1989.
[16]
Morgenstem, M., "Security and Inference in Multilevel Database and Knowledge~Base Systems", Proceedings of the ACM-SIGMOD International Conference on Management of Data, 1987.
[17]
Nilsson, n., Principles of Arttj~cial Intelligence, Tioga Publishing Company, Palo Alto, CA, 1980.
[18]
Schank, R., Inside Computer Understanding. Lawrence Erlbaum, 1981.
[19]
Schank, R., Dynamic Memory. Cambridge University Press, Cambridge, M.A. 1982.
[20]
Shin, D.G., "Lk: A Language for Capturing Real World Meanings of the Stored Data", Proceedings of the International Conference on Data Engineering, 1991.
[21]
Shin, D.G., "An Expectation-Driven Response Understanding Paradigm", iEEE Transactions on Knowledge and Data Engineering, In press.
[22]
Su, T.A. and Ozsoyoglu, G., "Multivalued Dependency Inferences in Multilevel Relational Database Systems", Database Security, III: Status and Prospects, Spooner, D.L. and Landwehr, C., editors, North-Holland, 1990.
[23]
Wiseman, S.R., "On the Problem of Security in Data Bases", Database Security, III: Status and Prospects, Spooner, D.L. and Landwehr, C., editors, North-Holland, 1990.

Cited By

View all
  • (2006)New challenges in teaching database securityProceedings of the 3rd annual conference on Information security curriculum development10.1145/1231047.1231060(64-67)Online publication date: 22-Sep-2006

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '93: Proceedings of the second international conference on Information and knowledge management
December 1993
742 pages
ISBN:0897916263
DOI:10.1145/170088
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 1993

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

CIKM93
Sponsor:
CIKM93: Conference on Information and Knowledge Management
November 1 - 5, 1993
D.C., Washington, USA

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)3
Reflects downloads up to 14 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2006)New challenges in teaching database securityProceedings of the 3rd annual conference on Information security curriculum development10.1145/1231047.1231060(64-67)Online publication date: 22-Sep-2006

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media