Deductive database security

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Abstract

An approach is described for protecting the information in deductive databases from unauthorized retrieval and update requests. The approach we propose combines meta-programming and partial evaluation techniques, has a number of attractive technical results associated with it, and can be used as a basis for efficient implementations of protected forms of deductive database.
Original languageEnglish
Title of host publicationResearch Directions In Data And Applications Security
EditorsE Gudes, S Shenoi
Place of PublicationNorwell
PublisherKluwer Academic Publishers
Pages103 - 114
Number of pages12
ISBN (Print)9781402075414
Publication statusPublished - Jul 2003
Event16th Annual Conference on Data and Applications Security - CAMBRIDGE, ENGLAND
Duration: 1 Jan 2003 → …

Publication series

NameInternational Federation For Information Processing

Conference

Conference16th Annual Conference on Data and Applications Security
CityCAMBRIDGE, ENGLAND
Period1/01/2003 → …

Fingerprint

Dive into the research topics of 'Deductive database security'. Together they form a unique fingerprint.

Cite this