We show how deductive databases may be protected against unauthorized retrieval and update requests issued by authenticated users.
Missing: Retrievals. | Show results with:Retrievals.
An approach is presented that addresses the problem of protecting deductive databases from unauthorized disclosures of the information they contain.
Abstract. An approach is presented that addresses the problem of protecting de- ductive databases from unauthorized disclosures of the information they.
We show how deductive databases may be protected against unauthorized retrieval and update requests issued by authenticated users.
Barker, S. ... (2001). Protecting Deductive Databases from Unauthorized Retrievals. In 14th IFIP Working Group Conference on Database Security (pp. 185 - 196).
Protecting Deductive Databases from Unauthorized Retrievals.
An approach is presented that addresses the problem of protecting deductive databases from unauthorized disclosures of the information they contain.
Protecting Deductive Databases from Unauthorized Retrievals. https://doi.org/10.1007/0-306-47008-x_17 · Full text. Journal: Data and Application Security IFIP ...
Dive into the research topics of 'Protecting deductive databases from unauthorized retrieval and update requests'. Together they form a unique fingerprint. Sort ...
People also ask
What are facts and rules in deductive database?
What is the difference between deductive database and relational database?
What are the advantages of deductive database?
What is a deductive model in DBMS?
An approach is presented that addresses the problem of protecting deductive databases from unauthorized disclosures of the information they contain.