Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered
Autor: | Joachim Biskup |
---|---|
Přispěvatelé: | Technische Universität Dortmund [Dortmund] (TU), Anoop Singhal, Jaideep Vaidya, TC 11, WG 11.3 |
Jazyk: | angličtina |
Rok vydání: | 2020 |
Předmět: |
A priori knowledge
Computer science media_common.quotation_subject Control (management) Epistemic state Inference Abstract data source Interaction protocol 02 engineering and technology Computer security computer.software_genre Best current view Closed-query evaluation Simulated current view 020204 information systems 0202 electrical engineering electronic engineering information engineering Information system View generation Confidentiality [INFO]Computer Science [cs] Function (engineering) Monotonic query media_common Inference-proofness 16. Peace & justice Prohibition 020201 artificial intelligence & image processing Lying State (computer science) Security invariant computer |
Zdroj: | Lecture Notes in Computer Science 34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) 34th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jun 2020, Regensburg, Germany. pp.79-99, ⟨10.1007/978-3-030-49669-2_5⟩ Data and Applications Security and Privacy XXXIV ISBN: 9783030496685 DBSec |
DOI: | 10.1007/978-3-030-49669-2_5⟩ |
Popis: | Part 2: Information Flow and Access Control; International audience; The concept of inference-proofness has been introduced for capturing strong confidentiality requirements—including privacy concerns—of an information owner, communicating with a semi-honest partner by means of their message exchanging computing agents according to some agreed interaction protocols. Such protocols include closed-query evaluation and view generation by the information system agent under the control of the information owner, and the corresponding request preparation by the client agent. The information owner employs a security mechanism for controlled interactions, shielding the epistemic state of the information system agent and suitably altering messages sent to the client agent. The alterings provably guarantee that the partner cannot infer the validity of any piece of information that the information owner has declared as being prohibited. Based on selected previous work, we carefully describe and inspect the underlying function and attack scenario and summarize and analyze basic approaches for controlled interactions within an abstract framework for epistemic states. |
Databáze: | OpenAIRE |
Externí odkaz: |