期刊文献+

基于推理通道的函数依赖推理控制 被引量:1

The Inference Control of Functional Dependency Based on Inference Channel
下载PDF
导出
摘要 数据库推理控制是数据库安全领域的重要研究内容。函数依赖关系在推理攻击中通常会起到重要作用。文中对基于函数依赖关系的推理控制问题进行了研究,在推理通道思想的基础上,提出了一种基于最小函数依赖集构造推理通道的方法,以及一种基于推理通道的动态组合通道实例的方法,实现了在数据库运行阶段针对函数依赖关系的动态推理控制。上述方法已应用于国产数据库神舟OSCAR安全版中,实践表明,上述方法能够有效地防御基于函数依赖关系的推理攻击。 Inference control is an important domain of database security. Generally speaking, functional dependency plays an important role in inference attack. This paper studies the inference control problem based on functional dependency, and then presents a method of constructing inference channels based on minimal functional dependency set, and another method of combining the instance of inference channel dynamically based on the idea of inference channel, which achieve the goal of dynamic inference control of functional dependency. The methods above mentioned have been applied to Sbenzhou OSCAR Secure Database, and the validity of defense against the inference attack based on functional dependency has been testified.
出处 《计算机仿真》 CSCD 2008年第1期88-91,215,共5页 Computer Simulation
基金 国家863高技术研究发展计划(2005AA4Z3020)
关键词 数据库安全 推理控制 推理通道 函数依赖 Database security Inference control Inference channel Functional dependency
  • 相关文献

参考文献8

  • 1Jessica Staddon. Dynamic Inference Control[C]. San Diego, California: Proc. of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2003.94- 100.
  • 2严和平,汪卫,施伯乐.安全数据库的推理控制[J].软件学报,2006,17(4):750-758. 被引量:11
  • 3Alexander Brodsky, Csilla Farkas, Sushil Jajodia. Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures [ J]. Piscataway, NJ: IEEE Trans. on Knowledge and Data Engineering, 2000, 12(6) : 900 -919.
  • 4S Jajodia, C Meadows. Inference problems in multilevel secure database management systems[C]. Los Alamitos: Information Security: An Integrated Collection of Essays. IEEE Computer Society Press, 1995. 570-584.
  • 5Tzong- An Su, Gultekin Ozsoyoglu. Controlling FD and MVD inferences in multilevel relational database systems[ J]. IEEE Trans. on Knowledge and Data Engineering, 1991, 3 (4) : 474- 485.
  • 6Donald G Marks. Inference in MLS Database Systems[J]. Piscataway, NJ: IEEE Trans. on Knowledge and Data Engineering, 1996, 8(1) : 46 -55
  • 7Raymond W Yip, Karl N Levitt. Data Level Inference Detection in Database Systems [ C ]. Rockport, Massachusetts: Proc. of the 11th IEEE Computer Security Foundations Workshop, 1998. 179 - 189.
  • 8GA/T389-2002计算机信息系统安全等级保护数据库管理系统技术要求[S].北京,中华人民共和国公安部,2002:24

二级参考文献13

  • 1Rizvi S,Mendelzon A,Sudarshan S,Roy P.Extending query rewriting techniques for fine-grained access control.In:ACM SIGMOD Conf.Paris,2004.551-562.
  • 2Bell DE,LaPadula LJ.Secure computer systems:Unified exposition and multics interpretation.Technical Report,ESD-TR-75-306,Bedford:MITRE Corp.,1976.
  • 3Jajodia S,Meadows C.Inference problems in multilevel secure database management systems.In:Abrams M,Jajodia S,Podell H,eds.Information Security:An Integrated Collection of Essays.Los Alamitos:IEEE Computer Society Press,1995.570-584.
  • 4Tzong,Ozsoyoglu G.Controlling FD and MVD inferences in multilevel relational database systems.IEEE Trans.on Knowledge and Data Engineering,1991,3(4):474-485.
  • 5Stickel M.Elimination of inference channels by optimal upgrading.In:Proc.of the 1994 IEEE Symp.on Research in Security and Privacy.Oakland,1994.168-174.
  • 6Hinke T.Inference aggregation detection in database management systems.In:Proc.of the IEEE Symp.on Security and Privacy.1998.96-106.
  • 7Lunt TF,Denning DE,Schell RR,Heckman M,Shockley WR.The seaview security model.IEEE Trans.on Software Engineering,1990,16(6):593-607.
  • 8Morgenstern M.Controlling logical inference in multilevel database systems.In:Proc.of the IEEE Symp.on Security and Privacy.1998.245-255.
  • 9Stachour P,Thuraisingham B.Design of LDV:A multilevel secure relational database management system.IEEE Trans.on Knowledge and Data Engineering,1990,2(2):190-209.
  • 10Kenthapadi K,Mishra N,Nissim K.Simulatable auditing.In:ACM Symp.on Principles of Database Systems.2005.118-127.

共引文献10

同被引文献24

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部