{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T21:50:41Z","timestamp":1719784241126},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2007,7,18]],"date-time":"2007-07-18T00:00:00Z","timestamp":1184716800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann Math Artif Intell"],"published-print":{"date-parts":[[2007,7,31]]},"DOI":"10.1007\/s10472-007-9070-5","type":"journal-article","created":{"date-parts":[[2007,7,17]],"date-time":"2007-07-17T07:58:40Z","timestamp":1184659120000},"page":"39-77","source":"Crossref","is-referenced-by-count":28,"title":["Controlled query evaluation with open queries for a decidable relational submodel"],"prefix":"10.1007","volume":"50","author":[{"given":"Joachim","family":"Biskup","sequence":"first","affiliation":[]},{"given":"Piero","family":"Bonatti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,7,18]]},"reference":[{"key":"9070_CR1","volume-title":"Foundations of Databases","author":"S. Abiteboul","year":"1995","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading, MA (1995)"},{"key":"9070_CR2","volume-title":"Solvable Cases of the Decision Problem","author":"W. Ackermann","year":"1968","unstructured":"Ackermann, W.: Solvable Cases of the Decision Problem. North-Holland, Amsterdam (1968)"},{"key":"9070_CR3","first-page":"307","volume-title":"A road-map on complexity for hybrid logics. Proceedings 13th Int. Workshop on Computer Science Logic, CSL 99, Lecture Notes in Computer Science 1683","author":"C. Areces","year":"1999","unstructured":"Areces, C., Blackburn, P., Marx, M.: A road-map on complexity for hybrid logics. Proceedings 13th Int. Workshop on Computer Science Logic, CSL 99, Lecture Notes in Computer Science 1683, pp. 307\u2013321. Springer, Berlin (1999)"},{"key":"9070_CR4","first-page":"308","volume":"286","author":"A.K. Ailamazyan","year":"1986","unstructured":"Ailamazyan, A.K., Gilula, M.M., Stolbushkin, A.P., Shvarts, G.F.: Reduction of a relational model with infinite domains to the finite-domain case. Russian version: Dokl. Akad. Nauk SSSR 286, 308\u2013311 (January 1986); English translation: Sov. Phys. Dokl. 31(1), 11\u201313 (January 1986)","journal-title":"Russian version: Dokl. Akad. Nauk SSSR"},{"key":"9070_CR5","volume-title":"The Description Logic Handbook: Theory, Implementation, and Applications","author":"F. Baader","year":"2003","unstructured":"Baader F., Calvanese D., McGuinness D.L., Nardi D., Patel-Schneider, P.F.: The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, Cambridge (2003)"},{"key":"9070_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0169-023X(99)00043-9","volume":"33","author":"J. Biskup","year":"2000","unstructured":"Biskup, J.: For unknown secrecies refusal is better than lying. Data Knowl. Eng. 33, 1\u201323 (2000)","journal-title":"Data Knowl. Eng."},{"key":"9070_CR7","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0169-023X(01)00024-6","volume":"38","author":"J. Biskup","year":"2001","unstructured":"Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38, 199\u2013222 (2001)","journal-title":"Data Knowl. Eng."},{"key":"9070_CR8","first-page":"49","volume-title":"Controlled query evaluation for known policies by combining lying and refusal. Proceedings 2nd Int. Symp. on the Foundations of Information and Knowledge Systems, FoIKS 02, Lecture Notes in Computer Science 2284","author":"J. Biskup","year":"2002","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Proceedings 2nd Int. Symp. on the Foundations of Information and Knowledge Systems, FoIKS 02, Lecture Notes in Computer Science 2284, pp. 49\u201366. Springer, Berlin (2002)"},{"key":"9070_CR9","first-page":"39","volume-title":"Confidentiality policies and their enforcement for controlled query evaluation. Proceedings 7th European Symp. on Research in Computer Security, ESORICS 02, Lecture Notes in Computer Science 2502","author":"J. Biskup","year":"2002","unstructured":"Biskup, J., Bonatti, P.A.: Confidentiality policies and their enforcement for controlled query evaluation. Proceedings 7th European Symp. on Research in Computer Security, ESORICS 02, Lecture Notes in Computer Science 2502, pp. 39\u201354. Springer, Berlin (2002)"},{"key":"9070_CR10","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1023\/A:1026106029043","volume":"40","author":"J. Biskup","year":"2004","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell. 40, 37\u201362 (2004)","journal-title":"Ann. Math. Artif. Intell."},{"issue":"1","key":"9070_CR11","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/s10207-004-0032-1","volume":"3","author":"J. Biskup","year":"2004","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Secur. 3(1), 14\u201327 (2004)","journal-title":"Int. J. Inf. Secur."},{"key":"9070_CR12","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/1-4020-8128-6_10","volume-title":"Research Directions in Data and Applications Security XVII","author":"J. Biskup","year":"2004","unstructured":"Biskup, J., Weibert, T.: Refusal in incomplete databases. In: Farkas, C., Samarati, P. (eds.) Research Directions in Data and Applications Security XVII, pp. 143\u2013157. Kluwer, Boston (2004)"},{"key":"9070_CR13","unstructured":"Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Workshop on Foundations of Computer Security, LICS 05, http:\/\/www.cs.chalmers.se\/~andrei\/FCS05\/ , Chicago (2005)"},{"key":"9070_CR14","first-page":"30","volume-title":"On finding an inference-proof complete database for controlled query evaluation. Proceedings Data and Applications Security 2006, Lecture Notes in Computer Science 4127","author":"J. Biskup","year":"2006","unstructured":"Biskup, J., Wiese, L.: On finding an inference-proof complete database for controlled query evaluation. Proceedings Data and Applications Security 2006, Lecture Notes in Computer Science 4127, pp. 30\u201343. Springer, Berlin (2006)"},{"issue":"3","key":"9070_CR15","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1109\/69.390247","volume":"7","author":"P.A. Bonatti","year":"1995","unstructured":"Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of secure deductive databases. IEEE Trans. Knowl. Data Eng. 7(3), 406\u2013422 (1995)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9070_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-59207-2","volume-title":"The Classical Decision Problem","author":"E. B\u00f6rger","year":"1997","unstructured":"B\u00f6rger, E., Gr\u00e4del, E., Gurevich, Y.: The Classical Decision Problem. Springer, Berlin (1997)"},{"issue":"6","key":"9070_CR17","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/69.895801","volume":"12","author":"A. Brodsky","year":"2000","unstructured":"Brodsky, A., Farkas, C., Jajodia, S.: Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng. 12(6), 900\u2013919 (2000)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9070_CR18","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/3-540-45349-0_9","volume-title":"Constraints, inference channels and secure databases. Principles and Practice of Constraint Programming - CP 2000, 6th International Conference, Singapore, September 18\u201321, 2000. Lecture Notes in Computer Science 1894","author":"A. Brodsky","year":"2000","unstructured":"Brodsky, A., Farkas, C., Wijesekera, D., Wang, X.S.: Constraints, inference channels and secure databases. Principles and Practice of Constraint Programming - CP 2000, 6th International Conference, Singapore, September 18\u201321, 2000. Lecture Notes in Computer Science 1894, pp. 98\u2013113. Springer, Berlin (2000)"},{"key":"9070_CR19","volume-title":"Database Security","author":"S. Castano","year":"1994","unstructured":"Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. Addison-Wesley, Wokingham, England (1994)"},{"key":"9070_CR20","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/S0169-023X(01)00006-4","volume":"37","author":"F. Cuppens","year":"2001","unstructured":"Cuppens, F., Gabillon, A.: Cover story management. Data Knowl. Eng. 37, 177\u2013201 (2001)","journal-title":"Data Knowl. Eng."},{"key":"9070_CR21","volume-title":"Cryptography and Data Security","author":"D.E. Denning","year":"1982","unstructured":"Denning, D.E.: Cryptography and Data Security. Addison-Wesley, Reading, MA (1982)"},{"key":"9070_CR22","doi-asserted-by":"crossref","unstructured":"Dawson, S., De Capitani di Vimercati, S., Lincoln, P., Samarati, P.: Minimal data upgrading to prevent inference and association attacks. Proc. of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), pp. 114\u2013125 (1999)","DOI":"10.1145\/303976.303988"},{"key":"9070_CR23","unstructured":"Dawson, S., De Capitani di Vimercati, S., Samarati, P.: Specification and enforcement of classification and inference constraints. 20th IEEE Symp. Secur. Priv. 181\u2013195 (1999)"},{"key":"9070_CR24","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03182-7","volume-title":"Finite Model Theory","author":"H.-D. Ebbinghaus","year":"1995","unstructured":"Ebbinghaus, H.-D., Flum, J.: Finite Model Theory. Springer, Berlin (1995)"},{"key":"9070_CR25","volume-title":"Fundamentals of Database Systems","author":"R. Elmasri","year":"2000","unstructured":"Elmasri, R., Navathe, S.B.: Fundamentals of Database Systems, 3rd edn. Addison-Wesley, Reading, MA (2000)","edition":"3"},{"issue":"2","key":"9070_CR26","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C. Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: a survey. ACM SIGKDD Explorations Newsletter 4(2), 6\u201311 (2002)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"9070_CR27","volume-title":"Computer Security","author":"D. Gollmann","year":"2006","unstructured":"Gollmann, D.: Computer Security, 2nd edn. Wiley, New York (2006)","edition":"2"},{"key":"9070_CR28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-07003-1","volume-title":"Elements of Finite Model Theory","author":"L. Libkin","year":"2004","unstructured":"Libkin, L.: Elements of Finite Model Theory. Springer, Berlin (2004)"},{"key":"9070_CR29","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-83189-8","volume-title":"Foundations of Logic Programming","author":"J.W. Lloyd","year":"1987","unstructured":"Lloyd, J.W.: Foundations of Logic Programming. Springer, Berlin (1987)"},{"key":"9070_CR30","volume-title":"Mathematical Logic","author":"J.R. Shoenfield","year":"1967","unstructured":"Shoenfield, J.R.: Mathematical Logic. Addison-Wesley, Reading (1967)"},{"issue":"1","key":"9070_CR31","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/319830.319833","volume":"8","author":"G.L. Sicherman","year":"1983","unstructured":"Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst. 8(1), 41\u201359 (1983)","journal-title":"ACM Trans. Database Syst."},{"issue":"4","key":"9070_CR32","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1109\/69.109108","volume":"3","author":"T.A. Su","year":"1991","unstructured":"Su, T.A., Ozsoyoglu, G.: Controlling FD and MVD inferences in multilevel relational database systems. IEEE Trans. Knowl. Data Eng. 3(4), 474\u2013485 (1991)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9070_CR33","volume-title":"Principles of Database and Knowlwdge-Base Systems \u2013 vol. I","author":"J.D. Ullman","year":"1988","unstructured":"Ullman, J.D.: Principles of Database and Knowlwdge-Base Systems \u2013 vol. I. Computer Science Press, Rockville, MD (1988)"},{"issue":"4","key":"9070_CR34","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1145\/195664.195675","volume":"19","author":"M. Winslett","year":"1994","unstructured":"Winslett, M., Smith, K., Qian, X.: Formal query languages for secure relational databases. ACM Trans. Database Syst. 19(4), 626\u2013662 (1994)","journal-title":"ACM Trans. Database Syst."}],"container-title":["Annals of Mathematics and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10472-007-9070-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10472-007-9070-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10472-007-9070-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T17:51:50Z","timestamp":1559152310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10472-007-9070-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7,18]]},"references-count":34,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2007,7,31]]}},"alternative-id":["9070"],"URL":"https:\/\/doi.org\/10.1007\/s10472-007-9070-5","relation":{},"ISSN":["1012-2443","1573-7470"],"issn-type":[{"value":"1012-2443","type":"print"},{"value":"1573-7470","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,7,18]]}}}