Inference control aims at disabling a participant to gain a piece of information to be kept confidential. Considering a provider-client architecture for information systems, we present transaction-based protocols for provider-client interactions and prove that the incorporated inference control performed by the provider is effective indeed. The interactions include the provider answering a client's query and processing update requests of two forms. Such a request is either initiated by the provider and thus possibly to be forwarded to clients in order to refresh their views, or initiated by a client according to his view and thus to be translated to the repository maintained by the provider. © 2009 Springer Berlin Heidelberg.
CITATION STYLE
Biskup, J., Gogolin, C., Seiler, J., & Weibert, T. (2009). Requirements and protocols for inference-proof interactions in information systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5789 LNCS, pp. 285–302). https://doi.org/10.1007/978-3-642-04444-1_18
Mendeley helps you to discover research relevant for your work.