基于函数依赖的信息泄漏评估研究
Evaluating Information Leakage by Function Dependencies
摘要
当系统与网络均正常运行时,发布到互联网上的关系数据仍然可能在逻辑上发生敏感信息的泄漏.定义了不同程度的信息泄漏;阐述了函数依赖作为导致信息泄漏的原因;提出了一种在数据发布之前检测信息泄漏的算法,对促进逻辑上更为安全的数据发布有所裨益.
出处
《计算机研究与发展》
EI
CSCD
北大核心
2006年第z3期219-222,共4页
Journal of Computer Research and Development
基金
北京市自然科学基金项目(4052006)
北京大学听觉与视觉国家重点实验室开放基金项目(0509)
北京工业大学博士科研启动基金项目(00159)
参考文献14
-
1[1]Alun Michael.DTI Information Security Breaches Survey 2006.http://www.security-survey.gov.uk,2006-4-25
-
2[2]Patricia P Griffiths,Bradford W Wade.An authorization mechanism for a telational fatabase dystem.ACM Trans on Database Syst.1976,1(3):242-255
-
3[3]Ronald Fagin.On an authorization mechanism.ACM Trans on Database Syst.1978,3(3):310-319
-
4[4]Arnon Rosenthal,Marianne Winslett.Security of shared data in large systems:State of the art and research directions.ACM SIGMOD 2004,Paris,France,2004
-
5[5]Pierangela Samarati,Latanya Sweeney.Generalizing data to provide anonymity when disclosing information (Abstract).PODS Conference,Seattle,USA,1998
-
6[6]Adam Meyerson,Ryan Williams.On the complexity of optimal k-anonymity.PODS Conference,Paris,France,2004
-
7[7]Gerome Miklau,Dan Suciu.A formal analysis of information disclosure in data exchange.SIGMOD Conference,Paris,France,2004
-
8[8]Xiaochun Yang,Chen Li.Secure XML publishing without information leakage in the presence of data inference.VLDB Conference,Toronto,Canada,2004
-
9[9]Rakesh Agrawal.Privacy in data systems.PODS Conference,San Diego,USA,2003
-
10[10]Martín Abadi,Bogdan Warinschi.Security analysis of cryptographically controlled access to XML documents.PODS Conference,Baltimore,USA,2005
二级参考文献25
-
1卢开澄.计算机密码学(第2版)[M].北京:清华大学出版社,1998..
-
2熊桂喜(译),SQL Server 7.0系统管理指南,1999年,144页
-
3Microsoft Corporation,Microsoft SQL Strver Books Online.安全管理部分,1998年
-
4ZHANG H X, LV Y H. The research on video signal electromagnetic radiation of computer based on near-field testing data[A]. The Third ASIA-PACIFIC Conference on Environmental Electromagnetics[C]. Hangzhou, 2003. 69-72.
-
5HARRINGTON R F. Time-Harmonic Electromagnetic Fields[M]. New York: McGraw-Hill, 2001.
-
6BERKE D. Hidden data transmission by controlling electromagnetic emanations of computers [EB/OL]. http://altern.org/berke/tempest/, 2000.
-
7KUHN M G, ANDERSON R J. Soft tempest: hidden data transmission using electromagnetic emanations[EB/OL]. http://www.cl. cam.ac.uk/ ~mgk25/ih98-tempest-slides.pdf, 2001.
-
8ANDERSON R J, KUHN M G. Soft TEMPEST-an opportunity for NATO[EB/OL]. http://www.cl.cam.ac.uk, May, 2000.
-
9VAN E W. Electromagnetic radiation form video display units: an eavesdropping risk? [J]. Computers & Security, 1985,4: 69-286.
-
10LU L, NIE Y, ZHANG H J. The electromagnetic leakage and protection for computer[A]. Electromagnetic Compatibility Proceedings, 1997 International Symposium on EMC[C]. Beijing, 1997. 378-382.
共引文献20
-
1张洪欣,吕英华,韩宇南,邱玉春.计算机电磁辐射信息识别特性研究[J].电波科学学报,2004,19(5):553-559. 被引量:2
-
2言天舒,唐柳春.基于C/S和B/S野生动物保护与管理信息系统的研究与实现[J].零陵学院学报(教育科学版),2004,2(5):170-171. 被引量:2
-
3秦岩,李涛,王涛.阵地图像监视系统的电磁泄漏及防护[J].兵工自动化,2004,23(6):23-24.
-
4付细楚,邹北骥,马锦波,杨波.考试系统中成绩安全性多级管理模式研究[J].科学技术与工程,2005,5(6):368-370. 被引量:10
-
5左仁广,汪新庆.地球科学数据共享[J].中国基础科学,2005,7(4):33-37. 被引量:2
-
6左仁广,汪新庆.地学信息管理系统研究——以全国重要成矿区带基础数据库管理系统为例[J].中国矿业,2005,14(10):34-37. 被引量:7
-
7ZHANG Hong-xin Lü Ying-hua BAO Yong-fang Lü Jian-gang.A Study on the EM Leakage Arising from Braided Shielding Cable[J].The Journal of China Universities of Posts and Telecommunications,2005,12(3):67-70.
-
8左仁广,汪新庆,夏庆霖.初论全国重要成矿区带基础数据库服务体系[J].地质科技情报,2006,25(2):64-68. 被引量:1
-
9刘长军,黄卡玛,闫丽萍,蒲天乐,张文赋.电磁辐射作用于计算机主板的模拟及效应评估[J].强激光与粒子束,2006,18(5):847-852. 被引量:16
-
10张洪欣,吕英华,贺鹏飞,王海侠.计算机电磁信息泄漏文字再现[J].西南交通大学学报,2007,42(6):653-658. 被引量:8