Abstract
Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.
Original language | English (US) |
---|---|
Pages (from-to) | 97-106 |
Number of pages | 10 |
Journal | ACM Transactions on Database Systems (TODS) |
Volume | 4 |
Issue number | 1 |
DOIs | |
State | Published - Mar 1 1979 |
All Science Journal Classification (ASJC) codes
- Information Systems
Keywords
- compromise
- database
- inference
- information flow
- protection
- security
- statistical query