Approximate Keys and Functional Dependencies in Incomplete Databases With Limited Domains-Algorithmic Perspective

M Al-atar, A Sali - arXiv preprint arXiv:2402.05161, 2024 - arxiv.org
A possible world of an incomplete database table is obtained by imputing values from the
attributes (infinite) domain to the place of\texttt {NULL} s. A table satisfies a possible key or …

Approximate keys and functional dependencies in incomplete databases with limited domains

M Al-Atar, A Sali - International Symposium on Foundations of Information …, 2022 - Springer
A possible world of an incomplete database table is obtained by imputing values from the
attributes (infinite) domain to the place of NULL s. A table satisfies a possible key or possible …

Inference-usability confinement by maintaining inference-proof views of an information system

J Biskup - … of Computational Science and Engineering 6, 2012 - inderscienceonline.com
Extending traditional access control and complementing emerging usage control, inference-
usability confinement aims at customising sensitive data to be returned to a client in such a …

An OBDD approach to enforce confidentiality and visibility constraints in data publishing

V Ciriani, S De Capitani di Vimercati… - Journal of …, 2012 - content.iospress.com
With the growing needs for data sharing and dissemination, privacy-preserving data
publishing is becoming an important issue that still requires further investigation. In this …

Database fragmentation with encryption: under which semantic constraints and a priori knowledge can two keep a secret?

J Biskup, M Preuß - Data and Applications Security and Privacy XXVII …, 2013 - Springer
Database outsourcing to semi-honest servers raises concerns against the confidentiality of
sensitive information. To hide such information, an existing approach splits data among two …

[图书][B] Applications

K Morik, J Rahnenführer, C Wietfeld - 2022 - degruyter.com
Machine Learning under Resource Constraints addresses novel machine learning
algorithms that are challenged by high-throughput data, by high dimensions, or by complex …

Approximate Integrity Constraints in Incomplete Databases With Limited Domains

M Al-atar, A Sali - arXiv preprint arXiv:2402.05057, 2024 - arxiv.org
In case of incomplete database tables, a possible world is obtained by replacing any
missing value by a value from the corresponding attribute's domain that can be infinite. A …

Selected results and related issues of confidentiality-preserving controlled interaction execution

J Biskup - Foundations of Information and Knowledge Systems …, 2016 - Springer
Abstract Controlled Interaction Execution has been developed as a security server for
inference control shielding an isolated, logic-oriented information system when interacting …

Information control by policy-based relational weakening templates

J Biskup, M Preuß - Computer Security–ESORICS 2016: 21st European …, 2016 - Springer
We conceptually design, formally verify and experimentally evaluate a sophisticated
information control mechanism for a relational database instance. The mechanism reacts on …

Inference-proof view update transactions with minimal refusals

J Biskup, C Tadros - International Workshop on Data Privacy Management, 2011 - Springer
Publishing information to clients of an information system may leak confidential information.
Even more, update transaction protocols must ensure both integrity and confidentiality of …