Secure Databases: Protection Against User Influence

David Dobkin, Anita K. Jones, Richard J. Lipton

Research output: Contribution to journalArticlepeer-review

129 Scopus citations


Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.

Original languageEnglish (US)
Pages (from-to)97-106
Number of pages10
JournalACM Transactions on Database Systems (TODS)
Issue number1
StatePublished - Mar 1 1979

All Science Journal Classification (ASJC) codes

  • Information Systems


  • compromise
  • database
  • inference
  • information flow
  • protection
  • security
  • statistical query

Cite this