Database Theory — ICDT '97

  • Hurtado C
  • Mendelzon A
ISSN: 16113349
N/ACitations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dependencies which express inclusion of unions of conjunctive queries with equality. This generalizes previous privacy work in the global-as-view publishing scenario and covers local-as-view as well as combinations of the two. We concentrate on logical security, where malicious users have the same level of access as legitimate users: they can issue queries against the global schema which are answered under “certain answers” semantics and then use unlimited computational power and external knowledge on the results of the queries to guess the result of a secret query (“the secret”) on one or more of the sources, which are not directly accessible. We do not address issues of physical security, which include how to prevent users from gaining unauthorized access to the data. We define both absolute guarantees: how safe is the secret? and relative guarantees: how much of the secret is additionally disclosed when the mapping is extended, for example to allow new data sources or new relationships between an existing data source and the global schema? We provide algorithms for checking whether these guarantees hold and undecidability results for related, stronger guarantees.

Cite

CITATION STYLE

APA

Hurtado, C., & Mendelzon, a. (1997). Database Theory — ICDT ’97. Proceedings of the 8th International Conference on Database Theory, 1186, 375–389. Retrieved from http://link.springer.com/10.1007/3-540-62222-5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free