Skip to main content

Declarative foundations of secure deductive databases

  • Conference paper
  • First Online:
Book cover Database Theory — ICDT '92 (ICDT 1992)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 646))

Included in the following conference series:

Abstract

In this paper, we develop a formal logical foundation for secure deductive databases. This logical foundation is based on an extended logic involving several modal operators. We develop two models of interaction between the user and the database called “yes-no” dialogs, and “yesno-don't know” dialogs. Both dialog frameworks allow the database to lie to the user. We identify necessary and sufficient conditions for the database to be able to preserve security. Similar results are also obtained for yes-no-don't know dialogs.

This work was supported by ARO Grant DAAL-03-92-G-0225 and NSF Grants IRI-91-09755 and IRI-9123460.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. F. Bancilhon and N. Spyratos. (1977) Protection of Information in Relational Data Bases, Proc. Intl. Symp. on Very Large Data Bases, Tokyo, Japan, pps 494–500.

    Google Scholar 

  2. J. Biskup and H. H. Bruggemann. (1988) The Personal Model of Data: Towards a Privacy-Oriented Information System, Computers and Security, 7, pps 575–597.

    Google Scholar 

  3. J. Biskup and H.-W. Graf. (1988) Analysis of the Privacy Model for the Information System Doris, Proc. Workshop on Database Security, Ontario, Canada.

    Google Scholar 

  4. P. Bonatti, S. Kraus and V.S. Subrahmanian. (1992) Foundations of Secure Deductive Databases, full version of this paper.

    Google Scholar 

  5. B. F. Chellas. (1980) Modal Logic: an introduction, Cambridge University Press, Cambridge.

    Google Scholar 

  6. D.E. Denning and M. Morgenstern. (1986) Military Database Technology Study: AI Techniques for Security and Reliability, SRI International Tech. Report — Project 1644.

    Google Scholar 

  7. D. Denning, T.F. Lunt, R.R. Schell, M. Heckman and W. Shockley. (1987) A Multilevel Relational Data Model, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, pps 46–56.

    Google Scholar 

  8. G. Sicherman, W. de Jonge and R.P. van de Riet. (1983) Answering Queries without Revealing Secrets, ACM Transactions on Database Systems, 8, 1, pps 41–49.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. S. Subrahmanian .

Editor information

Joachim Biskup Richard Hull

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bonatti, P., Kraus, S., Subrahmanian, V.S. (1992). Declarative foundations of secure deductive databases. In: Biskup, J., Hull, R. (eds) Database Theory — ICDT '92. ICDT 1992. Lecture Notes in Computer Science, vol 646. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-56039-4_55

Download citation

  • DOI: https://doi.org/10.1007/3-540-56039-4_55

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-56039-5

  • Online ISBN: 978-3-540-47360-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics