Abstract
Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.
| Original language | English (US) |
|---|---|
| Pages (from-to) | 97-106 |
| Number of pages | 10 |
| Journal | ACM Transactions on Database Systems (TODS) |
| Volume | 4 |
| Issue number | 1 |
| DOIs | |
| State | Published - Mar 1 1979 |
All Science Journal Classification (ASJC) codes
- Information Systems
Keywords
- compromise
- database
- inference
- information flow
- protection
- security
- statistical query