Declarative foundations of secure deductive databases
In this paper, we develop a formal logical foundation for secure deductive databases. This logical foundation is based on an extended logic involving several modal operators. We develop two models of interaction between the user and the database called “yes-no” dialogs, and “yesno-don't know” dialogs. Both dialog frameworks allow the database to lie to the user. We identify necessary and sufficient conditions for the database to be able to preserve security. Similar results are also obtained for yes-no-don't know dialogs.
KeywordsModal Logic Logical Consequence Propositional Formula Kripke Structure Deductive Database
Unable to display preview. Download preview PDF.
- F. Bancilhon and N. Spyratos. (1977) Protection of Information in Relational Data Bases, Proc. Intl. Symp. on Very Large Data Bases, Tokyo, Japan, pps 494–500.Google Scholar
- J. Biskup and H. H. Bruggemann. (1988) The Personal Model of Data: Towards a Privacy-Oriented Information System, Computers and Security, 7, pps 575–597.Google Scholar
- J. Biskup and H.-W. Graf. (1988) Analysis of the Privacy Model for the Information System Doris, Proc. Workshop on Database Security, Ontario, Canada.Google Scholar
- P. Bonatti, S. Kraus and V.S. Subrahmanian. (1992) Foundations of Secure Deductive Databases, full version of this paper.Google Scholar
- B. F. Chellas. (1980) Modal Logic: an introduction, Cambridge University Press, Cambridge.Google Scholar
- D.E. Denning and M. Morgenstern. (1986) Military Database Technology Study: AI Techniques for Security and Reliability, SRI International Tech. Report — Project 1644.Google Scholar
- D. Denning, T.F. Lunt, R.R. Schell, M. Heckman and W. Shockley. (1987) A Multilevel Relational Data Model, Proc. IEEE Symp. on Security and Privacy, Oakland, CA, pps 46–56.Google Scholar
- G. Sicherman, W. de Jonge and R.P. van de Riet. (1983) Answering Queries without Revealing Secrets, ACM Transactions on Database Systems, 8, 1, pps 41–49.Google Scholar