期刊文献+

基于函数依赖的信息泄漏评估研究

Evaluating Information Leakage by Function Dependencies
下载PDF
导出
摘要 当系统与网络均正常运行时,发布到互联网上的关系数据仍然可能在逻辑上发生敏感信息的泄漏.定义了不同程度的信息泄漏;阐述了函数依赖作为导致信息泄漏的原因;提出了一种在数据发布之前检测信息泄漏的算法,对促进逻辑上更为安全的数据发布有所裨益.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z3期219-222,共4页 Journal of Computer Research and Development
基金 北京市自然科学基金项目(4052006) 北京大学听觉与视觉国家重点实验室开放基金项目(0509) 北京工业大学博士科研启动基金项目(00159)
  • 相关文献

参考文献14

  • 1[1]Alun Michael.DTI Information Security Breaches Survey 2006.http://www.security-survey.gov.uk,2006-4-25
  • 2[2]Patricia P Griffiths,Bradford W Wade.An authorization mechanism for a telational fatabase dystem.ACM Trans on Database Syst.1976,1(3):242-255
  • 3[3]Ronald Fagin.On an authorization mechanism.ACM Trans on Database Syst.1978,3(3):310-319
  • 4[4]Arnon Rosenthal,Marianne Winslett.Security of shared data in large systems:State of the art and research directions.ACM SIGMOD 2004,Paris,France,2004
  • 5[5]Pierangela Samarati,Latanya Sweeney.Generalizing data to provide anonymity when disclosing information (Abstract).PODS Conference,Seattle,USA,1998
  • 6[6]Adam Meyerson,Ryan Williams.On the complexity of optimal k-anonymity.PODS Conference,Paris,France,2004
  • 7[7]Gerome Miklau,Dan Suciu.A formal analysis of information disclosure in data exchange.SIGMOD Conference,Paris,France,2004
  • 8[8]Xiaochun Yang,Chen Li.Secure XML publishing without information leakage in the presence of data inference.VLDB Conference,Toronto,Canada,2004
  • 9[9]Rakesh Agrawal.Privacy in data systems.PODS Conference,San Diego,USA,2003
  • 10[10]Martín Abadi,Bogdan Warinschi.Security analysis of cryptographically controlled access to XML documents.PODS Conference,Baltimore,USA,2005

二级参考文献25

  • 1卢开澄.计算机密码学(第2版)[M].北京:清华大学出版社,1998..
  • 2熊桂喜(译),SQL Server 7.0系统管理指南,1999年,144页
  • 3Microsoft Corporation,Microsoft SQL Strver Books Online.安全管理部分,1998年
  • 4ZHANG H X, LV Y H. The research on video signal electromagnetic radiation of computer based on near-field testing data[A]. The Third ASIA-PACIFIC Conference on Environmental Electromagnetics[C]. Hangzhou, 2003. 69-72.
  • 5HARRINGTON R F. Time-Harmonic Electromagnetic Fields[M]. New York: McGraw-Hill, 2001.
  • 6BERKE D. Hidden data transmission by controlling electromagnetic emanations of computers [EB/OL]. http://altern.org/berke/tempest/, 2000.
  • 7KUHN M G, ANDERSON R J. Soft tempest: hidden data transmission using electromagnetic emanations[EB/OL]. http://www.cl. cam.ac.uk/ ~mgk25/ih98-tempest-slides.pdf, 2001.
  • 8ANDERSON R J, KUHN M G. Soft TEMPEST-an opportunity for NATO[EB/OL]. http://www.cl.cam.ac.uk, May, 2000.
  • 9VAN E W. Electromagnetic radiation form video display units: an eavesdropping risk? [J]. Computers & Security, 1985,4: 69-286.
  • 10LU L, NIE Y, ZHANG H J. The electromagnetic leakage and protection for computer[A]. Electromagnetic Compatibility Proceedings, 1997 International Symposium on EMC[C]. Beijing, 1997. 378-382.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部