The fingerprinted database

作者: N.R. Wagner , R.L. Fountain , R.J. Hazy

DOI: 10.1109/ICDE.1990.113485

关键词:

摘要: A fingerprinting database management system presents a unique version or view of the data to each user. The contains small pseudorandom modifications selected items. objective this is identify users who divulge proprietary information which they have obtained through legitimate access. Even if user makes further before its misuse, statistical procedure will source misuse with any desired degree certainty. >

参考文章(8)
David Lachar, MMPI: Clinical Assessment and Automated Interpretation Western Psychological Services. ,(1974)
Richard A. DeMillo, David P. Dobkin, Anita K. Jones, Richard J. Lipton, Foundations of Secure Computation Academic Press, Inc.. ,(1978)
Richard D. Graubart, Kevin J. Duffy, Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS ieee symposium on security and privacy. pp. 147- 147 ,(1985) , 10.1109/SP.1985.10016
Billy G. Claybrook, Using Views in a Multilevel Secure Database Management System ieee symposium on security and privacy. pp. 4- 4 ,(1983) , 10.1109/SP.1983.10009
Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G Neumann, Roger R. Schell, Mark Heckman, Views for Multilevel Database Security ieee symposium on security and privacy. pp. 156- 156 ,(1986) , 10.1109/SP.1986.10012
Dorothy E Denning, Selim G Akl, Mark Heckman, Teresa F. Lunt, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Views for Multilevel Database Security IEEE Transactions on Software Engineering. ,vol. 13, pp. 129- 140 ,(1987) , 10.1109/TSE.1987.232889
Dorothy E. Denning, Commutative Filters for Reducing Inference Threats in Multilevel Database Systems ieee symposium on security and privacy. pp. 134- 134 ,(1985) , 10.1109/SP.1985.10017
F. Peyrot, D. B. Owen, Handbook of statistical tables Revue de l'Institut International de Statistique / Review of the International Statistical Institute. ,vol. 126, pp. 325- ,(1962) , 10.2307/1401753