Back to Search Start Over

Database Security.

Authors :
Davida, George I.
Linton, David J.
Szelag, C. Russell
Wells, David L.
Source :
IEEE Transactions on Software Engineering. Nov78, Vol. 4 Issue 6, p531-533. 3p.
Publication Year :
1978

Abstract

Databases may be compromised by asking a set of queries which return only statistical information and making inferences about a specific entry from the results of the set of queries. We present methods of constructing the set of queries to compromise a database where all the queries in the set return the maximum of a set of k elements, or all queries return the mean of a set of k elements. In the case of the mean query, all elements involved will be compromised. We also consider bounds on the number of queries required to compromise the database. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00985589
Volume :
4
Issue :
6
Database :
Academic Search Index
Journal :
IEEE Transactions on Software Engineering
Publication Type :
Academic Journal
Accession number :
19100101