REFERENCES
Agrawal, R., Bird, P., Grandison, T., Kiernan, J., Logan, S.,
and Rjaibi, W. (2005). Extending relational database
systems to automatically enforce privacy policies. In
Proceedings of the 21st International Conference on
Data Engineering, ICDE ’05, pages 1013–1022. IEEE
Computer Society.
Bertino, E., Jajodia, S., and Samarati, P. (1999). A flexi-
ble authorization mechanism for relational data man-
agement systems. ACM Transactions on Information
Systems, 17(2):101–140.
B
¨
ottcher, S., Hartel, R., and Kirschner, M. (2008). Detect-
ing suspicious relational database queries. In Proceed-
ings of the 3rd International Conference on Availabil-
ity, Reliability and Security, ARES ’08, pages 771–
778. IEEE Computer Society.
Cousot, P. and Cousot, R. (1977). Abstract interpretation: a
unified lattice model for static analysis of programs by
construction or approximation of fixpoints. In Con-
ference Record of the Sixth Annual ACM SIGPLAN-
SIGACT Symposium on Principles of Programming
Languages, pages 238–252, Los Angeles, CA, USA.
ACM Press.
Giacobazzi, R., Ranzato, F., and Scozzari, F. (2000). Mak-
ing abstract interpretations complete. Journal of the
ACM (JACM), 47(2):361–416.
Griffiths, P. P. and Wade, B. W. (1976). An authorization
mechanism for a relational database system. ACM
Transactions on Database Systems, 1(3):242–255.
Halder, R. and Cortesi, A. (2010). Abstract interpretation
for sound approximation of database query languages.
In Proceedings of the IEEE 7th International Confer-
ence on INFOrmatics and Systems (INFOS2010), Ad-
vances in Data Engineering and Management Track,
pages 53–59, Cairo, Egypt. IEEE Catalog Number:
IEEE CFP1006J-CDR.
Hsu, T.-s., Liau, C.-J., Wang, D.-W., and Chen, J. K.-P.
(2002). Quantifying privacy leakage through answer-
ing database queries. In Proceedings of the 5th Inter-
national Conference on Information Security, ISC ’02,
pages 162–176, London, UK. Springer-Verlag.
Jajodia, S., Samarati, P., Subrahmanian, V. S., and Bertino,
E. (1997). A unified framework for enforcing multiple
access control policies. SIGMOD Record, 26(2):474–
485.
Kabra, G., Ramamurthy, R., and Sudarshan, S. (2006). Re-
dundancy and information leakage in fine-grained ac-
cess control. In Proceedings of the ACM SIGMOD in-
ternational conference on Management of data, SIG-
MOD ’06, pages 133–144, Chicago, IL, USA. ACM
Press.
LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan,
R., Xu, Y., and DeWitt, D. (2004). Limiting disclosure
in hippocratic databases. In Proceedings of the 30th
international conference on Very large data bases,
VLDB ’04, pages 108–119. VLDB Endowment.
Rizvi, S., Mendelzon, A., Sudarshan, S., and Roy, P.
(2004). Extending query rewriting techniques for fine-
grained access control. In Proceedings of the ACM
SIGMOD international conference on Management of
data, SIGMOD ’04, pages 551–562, Paris, France.
ACM Press.
Sabelfeld, A. and Myers, A. C. (2003). Language-based
information-flow security. IEEE Journal on selected
areas in Communications, 21(1):5–19.
Shi, J., Zhu, H., Fu, G., and Jiang, T. (2009). On the sound-
ness property for sql queries of fine-grained access
control in dbmss. In ICIS ’09: Proceedings of the
2009 Eigth IEEE/ACIS International Conference on
Computer and Information Science, pages 469–474,
Shanghai, China. IEEE Computer Society.
Wang, Q., Yu, T., Li, N., Lobo, J., Bertino, E., Irwin, K.,
and Byun, J.-W. (2007). On the correctness criteria
of fine-grained access control in relational databases.
In Proceedings of the 33rd international conference
on Very large data bases, VLDB ’07, pages 555–566,
Vienna, Austria. VLDB Endowment.
Zhu, H. and L
¨
u, K. (2007). Fine-grained access control for
database management systems. In Proceedings of the
24th British National Conference on Databases, pages
215–223, Glasgow, UK. Springer Verlag LNCS.
Zhu, H., Shi, J., Wang, Y., and Feng, Y. (2008). Controlling
information leakage of fine-grained access model in
dbmss. In Proceedings of the 9th International Con-
ference on Web-Age Information Management, WAIM
’08, pages 583–590, Zhangjiajie, China. IEEE Com-
puter Society.
OBSERVATION-BASED FINE GRAINED ACCESS CONTROL FOR RELATIONAL DATABASES
265