Statistical Database Auditing Without Query Denial Threat
نویسندگان
چکیده
منابع مشابه
Security and Auditing Protection Method for Statistical Database
According to the statistical data security and auditing requirement, an effective Security Protection Method and a Rules-based Statistical Data Auditing (RSDA) solution are given. In this article, we introduce the classification and expression of statistical auditing rule.
متن کامل1 Database Auditing
Government regulations and increased awareness of security issues have increased the auditing requirements of information technology systems. In this paper, we will discuss three government regulations and how they have impacted information technology systems. We classify database auditing systems by considering features of the basic components of an auditing system as proposed by Bishop: the l...
متن کاملQuery Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases
In this paper, we define a novel setting for query auditing, where instead of detecting or preventing the disclosure of individual sensitive values, we want to detect or prevent the disclosure of aggregate values in the database. More specifically, we study the problem of detecting or preventing the disclosure of the maximum (minimum) value in the database, when the querier is allowed to issue ...
متن کاملDatabase Auditing Design on Historical Data
Database Auditing is one of the major issues in information security. Lack of data auditing leads the business applications to the lost trail of business processes. To cope with auditing, historical data or temporal database is needed in order to track operations and actors of the operation with the time. Valid and transaction times are two major timestamps in temporal database. In this paper, ...
متن کاملAuditing Compliance with a Hippocratic Database
We introduce an auditing framework for determining whether a database system is adhering to its data disclosure policies. Users formulate audit expressions to specify the (sensitive) data subject to disclosure review. An audit component accepts audit expressions and returns all queries (deemed “suspicious”) that accessed the specified data during their execution. The overhead of our approach on...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: INFORMS Journal on Computing
سال: 2015
ISSN: 1091-9856,1526-5528
DOI: 10.1287/ijoc.2014.0607