Foundations of secure deductive databases
- 1 June 1995
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Knowledge and Data Engineering
- Vol. 7 (3) , 406-422
- https://doi.org/10.1109/69.390247
Abstract
No abstract availableThis publication has 19 references indexed in Scilit:
- A definition of secure dependencies using the logic of securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Computing Circumscriptive DatabasesInformation and Computation, 1995
- Declarative foundations of secure deductive databasesPublished by Springer Nature ,1992
- Controlling FD and MVD inferences in multilevel relational database systemsIEEE Transactions on Knowledge and Data Engineering, 1991
- Control of confidentiality in databasesComputers & Security, 1990
- Nonmonotonic reasoning, preferential models and cumulative logicsArtificial Intelligence, 1990
- Security-control methods for statistical databases: a comparative studyACM Computing Surveys, 1989
- The personal model of data:Computers & Security, 1988
- Linear-time algorithms for testing the satisfiability of propositional horn formulaeThe Journal of Logic Programming, 1984
- Answering queries without revealing secretsACM Transactions on Database Systems, 1983