Reasoning about disclosure in data integration ...
Type de document :
Communication dans un congrès avec actes
Titre :
Reasoning about disclosure in data integration in the presence of source constraints
Auteur(s) :
Benedikt, Michael [Auteur]
Department of Computer Science [Oxford]
Bourhis, Pierre [Auteur]
Self-adaptation for distributed services and large software systems [SPIRALS]
Jachiet, Louis [Auteur]
Self-adaptation for distributed services and large software systems [SPIRALS]
Thomazo, Michaël [Auteur]
Value from Data [VALDA]
Department of Computer Science [Oxford]
Bourhis, Pierre [Auteur]

Self-adaptation for distributed services and large software systems [SPIRALS]
Jachiet, Louis [Auteur]
Self-adaptation for distributed services and large software systems [SPIRALS]
Thomazo, Michaël [Auteur]
Value from Data [VALDA]
Titre de la manifestation scientifique :
IJCAI 2019 - 28th International Joint Conference on Artificial Intelligence
Ville :
Macao
Pays :
Chine
Date de début de la manifestation scientifique :
2019-08-10
Discipline(s) HAL :
Informatique [cs]/Intelligence artificielle [cs.AI]
Informatique [cs]/Base de données [cs.DB]
Informatique [cs]/Base de données [cs.DB]
Résumé en anglais : [en]
Data integration systems allow users to access data sitting in multiple sources by means of queries over a global schema, related to the sources via mappings. Data sources often contain sensitive information, and thus an ...
Lire la suite >Data integration systems allow users to access data sitting in multiple sources by means of queries over a global schema, related to the sources via mappings. Data sources often contain sensitive information, and thus an analysis is needed to verify that a schema satisfies a privacy policy, given as a set of queries whose answers should not be accessible to users. Such an analysis should take into account not only knowledge that an attacker may have about the mappings, but also what they may know about the semantics of the sources. In this paper, we show that source constraints can have a dramatic impact on disclosure analysis. We study the problem of determining whether a given data integration system discloses a source query to an attacker in the presence of constraints, providing both lower and upper bounds on source-aware disclosure analysis.Lire moins >
Lire la suite >Data integration systems allow users to access data sitting in multiple sources by means of queries over a global schema, related to the sources via mappings. Data sources often contain sensitive information, and thus an analysis is needed to verify that a schema satisfies a privacy policy, given as a set of queries whose answers should not be accessible to users. Such an analysis should take into account not only knowledge that an attacker may have about the mappings, but also what they may know about the semantics of the sources. In this paper, we show that source constraints can have a dramatic impact on disclosure analysis. We study the problem of determining whether a given data integration system discloses a source query to an attacker in the presence of constraints, providing both lower and upper bounds on source-aware disclosure analysis.Lire moins >
Langue :
Anglais
Comité de lecture :
Oui
Audience :
Internationale
Vulgarisation :
Non
Collections :
Source :
Fichiers
- https://hal.inria.fr/hal-02145369v3/document
- Accès libre
- Accéder au document
- http://arxiv.org/pdf/1906.00624
- Accès libre
- Accéder au document
- https://hal.inria.fr/hal-02145369v3/document
- Accès libre
- Accéder au document
- https://hal.inria.fr/hal-02145369v3/document
- Accès libre
- Accéder au document
- document
- Accès libre
- Accéder au document
- hal.pdf
- Accès libre
- Accéder au document
- 1906.00624
- Accès libre
- Accéder au document