The Community for Technology Leaders
Green Image
Issue No. 06 - November (1978 vol. 4)
ISSN: 0098-5589
pp: 531-533
G.I. Davida , Department of Electrical Engineering and Computer Science, University of Wisconsin
Databases may be compromised by asking a set of queries which return only statistical information and making inferences about a specific entry from the results of the set of queries. We present methods of constructing the set of queries to compromise a database where all the queries in the set return the maximum of a set of k elements, or all queries return the mean of a set of k elements. In the case of the mean query, all elements involved will be compromised. We also consider bounds on the number of queries required to compromise the database.
queries, Averages, compromise, databases, security

G. Davida, D. Wells, D. Linton and C. Szelag, "Database Security," in IEEE Transactions on Software Engineering, vol. 4, no. , pp. 531-533, 1978.
81 ms
(Ver 3.3 (11022016))