Declarative foundations of secure deductive databases

  • Piero Bonatti
  • Sarit Kraus
  • V. S. SubrahmanianEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 646)


In this paper, we develop a formal logical foundation for secure deductive databases. This logical foundation is based on an extended logic involving several modal operators. We develop two models of interaction between the user and the database called “yes-no” dialogs, and “yesno-don't know” dialogs. Both dialog frameworks allow the database to lie to the user. We identify necessary and sufficient conditions for the database to be able to preserve security. Similar results are also obtained for yes-no-don't know dialogs.


Modal Logic Logical Consequence Propositional Formula Kripke Structure Deductive Database 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    F. Bancilhon and N. Spyratos. (1977) Protection of Information in Relational Data Bases, Proc. Intl. Symp. on Very Large Data Bases, Tokyo, Japan, pps 494–500.Google Scholar
  2. [2]
    J. Biskup and H. H. Bruggemann. (1988) The Personal Model of Data: Towards a Privacy-Oriented Information System, Computers and Security, 7, pps 575–597.Google Scholar
  3. [3]
    J. Biskup and H.-W. Graf. (1988) Analysis of the Privacy Model for the Information System Doris, Proc. Workshop on Database Security, Ontario, Canada.Google Scholar
  4. [4]
    P. Bonatti, S. Kraus and V.S. Subrahmanian. (1992) Foundations of Secure Deductive Databases, full version of this paper.Google Scholar
  5. [5]
    B. F. Chellas. (1980) Modal Logic: an introduction, Cambridge University Press, Cambridge.Google Scholar
  6. [6]
    D.E. Denning and M. Morgenstern. (1986) Military Database Technology Study: AI Techniques for Security and Reliability, SRI International Tech. Report — Project 1644.Google Scholar
  7. [7]
    D. Denning, T.F. Lunt, R.R. Schell, M. Heckman and W. Shockley. (1987) A Multilevel Relational Data Model, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, pps 46–56.Google Scholar
  8. [8]
    G. Sicherman, W. de Jonge and R.P. van de Riet. (1983) Answering Queries without Revealing Secrets, ACM Transactions on Database Systems, 8, 1, pps 41–49.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1992

Authors and Affiliations

  • Piero Bonatti
    • 1
  • Sarit Kraus
    • 2
  • V. S. Subrahmanian
    • 3
    Email author
  1. 1.Dip. di InformaticaUniversita' di PisaPisaItaly
  2. 2.Department of Computer ScienceBar-Ilan UniversityRamat GanIsrael
  3. 3.Institute for Advanced Computer Studies and Department of Computer ScienceUniversity of MarylandCollege Park

Personalised recommendations