Secure Databases: Protection Against User Influence

David Paul Dobkin, Anita K. Jones, Richard J. Lipton

Research output: Contribution to journalArticle

127 Citations (Scopus)

Abstract

Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.

Original languageEnglish (US)
Pages (from-to)97-106
Number of pages10
JournalACM Transactions on Database Systems (TODS)
Volume4
Issue number1
DOIs
StatePublished - Mar 1 1979
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Information Systems

Cite this

Dobkin, David Paul ; Jones, Anita K. ; Lipton, Richard J. / Secure Databases : Protection Against User Influence. In: ACM Transactions on Database Systems (TODS). 1979 ; Vol. 4, No. 1. pp. 97-106.
@article{1e6776d0aa3b4e268a4cb3aa30bf7cec,
title = "Secure Databases: Protection Against User Influence",
abstract = "Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.",
author = "Dobkin, {David Paul} and Jones, {Anita K.} and Lipton, {Richard J.}",
year = "1979",
month = "3",
day = "1",
doi = "https://doi.org/10.1145/320064.320068",
language = "English (US)",
volume = "4",
pages = "97--106",
journal = "ACM Transactions on Database Systems",
issn = "0362-5915",
publisher = "Association for Computing Machinery (ACM)",
number = "1",

}

Secure Databases : Protection Against User Influence. / Dobkin, David Paul; Jones, Anita K.; Lipton, Richard J.

In: ACM Transactions on Database Systems (TODS), Vol. 4, No. 1, 01.03.1979, p. 97-106.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Secure Databases

T2 - Protection Against User Influence

AU - Dobkin, David Paul

AU - Jones, Anita K.

AU - Lipton, Richard J.

PY - 1979/3/1

Y1 - 1979/3/1

N2 - Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.

AB - Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.

UR - http://www.scopus.com/inward/record.url?scp=0018444418&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0018444418&partnerID=8YFLogxK

U2 - https://doi.org/10.1145/320064.320068

DO - https://doi.org/10.1145/320064.320068

M3 - Article

VL - 4

SP - 97

EP - 106

JO - ACM Transactions on Database Systems

JF - ACM Transactions on Database Systems

SN - 0362-5915

IS - 1

ER -