Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: DBSec 2011
Guest editors: Yingjiu LiGuest Editor
Article type: Research Article
Authors: Biskup, Joachim; *; **
Affiliations: Technische Universität Dortmund, 44221 Dortmund, Germany. E-mail: joachim.biskup@cs.tu-dortmund.de
Correspondence: [**] Address for correspondence: Joachim Biskup, Technische Universität Dortmund, 44221 Dortmund, Germany. Tel.: +49 231 755 2641; Fax: +49 231 755 2405; E-mail: joachim.biskup@cs.tu-dortmund.de.
Note: [1] This article is a revised and extended version of the contribution [7] to DBSec 2011, published by Springer-Verlag in volume 6818 of LNCS. Besides much more explanations given throughout the article, the following additional material is newly presented: the background taken from the field of Boolean functions including a proof of a basic proposition (Proposition 2), a complete formal verification of the protocol (proof of Theorem 1), and a comprehensive complexity analysis (Section 5).
Note: [*] This work has been performed within the framework of the Collaborative Research Center “Providing Information by Resource-Constrained Data Analysis”, supported by the Deutsche Forschungsgemeinschaft under Grant SFB 876/A5.
Abstract: Policy-based inference control of queries submitted to a logic-oriented information system aims at confining answers to queries such that the user cannot infer the validity of any sentence specified in a confidentiality policy. Such a control requires us to consider the history of queries and answers to a particular user. In most previous approaches, the control system captures the history by maintaining a fictitious view the user is supposed to generate by exploiting rational reasoning. In this paper, we propose and explore an alternative option to represent the history, namely by suitably adapting the confidentiality policy after returning an answer to a query. Basically, such a policy adaptation precomputes all relevant steps of formal proofs that the fictitious view logically implies some policy element. Focusing on propositional information systems, we present a comprehensive protocol for policy adaptation, which always keeps the current version of the confidentiality policy redundancy-free and fully vulnerable. This protocol is formally proved to be effective by a reduction argument, showing that policy adaptation is able to simulate the achievements of maintaining a view. We also briefly discuss the efficiency for special cases under dedicated data structures.
Keywords: A priori knowledge, closed query, confidentiality policy, Controlled Query Evaluation, disjunctive form, inference control, information system, interaction history, implication problem, policy adaptation, prime implicant, propositional logic, refusal, SAT-solving, theorem-proving, view
DOI: 10.3233/JCS-2012-0450
Journal: Journal of Computer Security, vol. 20, no. 5, pp. 509-546, 2012
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl