Abstract
An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of information. A controlled query evaluation should enforce such a policy even if users are able to reason about a priori knowledge and the answers to previous queries. The following aspects are considered: formal models of confidentiality policies based on potential secrets or secrecies, user awareness of the policy instance, and enforcement methods applying either lying or refusal, or a combination thereof. Reconsidering previous work and filling the gaps, we comprehensively treat and compare the resulting 12 cases. Thereby, the assumed completeness of the information system is essentially used.
Similar content being viewed by others
References
Biskup J (2000) For unknown secrecies refusal is better than lying. Data Knowl Eng 33:1–23
Biskup J, Bonatti PA (2001) Lying versus refusal for known potential secrets. Data Knowl Eng 38:199–222
Biskup J, Bonatti PA (2002) Controlled query evaluation for known policies by combining lying and refusal. In: Proceedings of the 2nd international symposium on the foundations of information and knowledge systems (FoIKS 02), Schloss Salzau, February 2002. Lecture notes in computer science, vol 2284. Springer, Berlin Heidelberg New York, pp 49–66
Biskup J, Bonatti PA (2002) Confidentiality policies and their enforcement for controlled query evaluation. In: Proceedings of the 7th European symposium on research in computer security (ESORICS 02), Zurich, October 2002. Lecture notes in computer science, vol 2502, Springer, Berlin Heidelberg New York, pp 39–54
Bonatti PA, Kraus S, Subrahmanian VS (1995) Foundations of secure deductive databases. IEEE Trans Knowl Data Eng 7(3):406–422
Castano S, Fugini M, Martella G, Samarati P (1994) Database security. Addison-Wesley, Reading, MA
Denning DE (1982) Cryptography and data security. Addison-Wesley, Reading, MA
Lloyd JW (1987) Foundations of logic programming. Springer, Berlin Heidelberg New York
Shoenfield JR (1967) Mathematical logic. Addison-Wesley, Reading, MA
Sicherman GL, de Jonge W, van de Riet RP (1983) Answering queries without revealing secrets. ACM Trans Database Sys 8(1):41–59
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Biskup, J., Bonatti, P. Controlled query evaluation for enforcing confidentiality in complete information systems. IJIS 3, 14–27 (2004). https://doi.org/10.1007/s10207-004-0032-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-004-0032-1