Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.
|Original language||English (US)|
|Number of pages||10|
|Journal||ACM Transactions on Database Systems (TODS)|
|State||Published - Mar 1 1979|
All Science Journal Classification (ASJC) codes
- Information Systems