Secure Databases: Protection Against User Influence

David Dobkin, Anita K. Jones, Richard J. Lipton

Research output: Contribution to journalArticlepeer-review

130 Scopus citations

Abstract

Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.

Original languageEnglish (US)
Pages (from-to)97-106
Number of pages10
JournalACM Transactions on Database Systems (TODS)
Volume4
Issue number1
DOIs
StatePublished - Mar 1 1979

All Science Journal Classification (ASJC) codes

  • Information Systems

Keywords

  • compromise
  • database
  • inference
  • information flow
  • protection
  • security
  • statistical query

Fingerprint

Dive into the research topics of 'Secure Databases: Protection Against User Influence'. Together they form a unique fingerprint.

Cite this