High-assurance integrity techniques for databases

被引:0
|
作者
Bertino, Elisa [1 ]
Dai, Chenyun [1 ]
Lim, Hyo-Sang [1 ]
Lin, Dan [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institutions, it is critical to ensure data integrity so that effective decisions can be made based on these data. In this paper, we first present an architecture for a comprehensive integrity control system based on data validation and metadata management. We then discuss an important issue in the data validation, that is, the evaluation of data provenance and propose a trust model for estimating the trustworthiness of data and data providers. By taking into account confidence about data provenance, we introduce an approach for policy observing query evaluation as a complement to the integrity control system.
引用
收藏
页码:244 / 256
页数:13
相关论文
共 50 条
  • [1] High-assurance zeroization
    Arranz Olmos S.
    Barthe G.
    Gonzalez R.
    Grégoire B.
    Laporte V.
    Léchenet J.-C.
    Oliveira T.
    Schwabe P.
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2024 (01): : 375 - 397
  • [2] High-assurance systems
    Bhattacharya, S
    Onoma, A
    Bastani, F
    [J]. COMMUNICATIONS OF THE ACM, 1997, 40 (01) : 67 - 67
  • [3] High-Assurance Control
    How, Jonathan P.
    [J]. IEEE CONTROL SYSTEMS MAGAZINE, 2017, 37 (02): : 5 - 13
  • [4] High-assurance timing analysis for a high-assurance real-time operating system
    Thomas Sewell
    Felix Kam
    Gernot Heiser
    [J]. Real-Time Systems, 2017, 53 : 812 - 853
  • [5] High-assurance timing analysis for a high-assurance real-time operating system
    Sewell, Thomas
    Kam, Felix
    Heiser, Gernot
    [J]. REAL-TIME SYSTEMS, 2017, 53 (05) : 812 - 853
  • [6] The High-Assurance ROS Framework
    Santos, Andre
    Cunha, Alcino
    Macedo, Nuno
    [J]. 2021 IEEE/ACM 3RD INTERNATIONAL WORKSHOP ON ROBOTICS SOFTWARE ENGINEERING (ROSE 2021), 2021, : 37 - 40
  • [7] Specifying high-assurance services
    Atkinson, Colin
    Brenner, Daniel
    Falcone, Giovanni
    Juhasz, Monika
    [J]. COMPUTER, 2008, 41 (08) : 64 - +
  • [8] Key applications for high-assurance systems
    Yen, IL
    Paul, R
    Winter, VL
    Covan, JM
    Dalton, LJ
    Alkalai, L
    Tai, AT
    Harper, R
    Flahive, B
    Tsai, WT
    Mojdehbakhsh, R
    Rayadurgam, S
    Mori, K
    Lowry, MR
    [J]. COMPUTER, 1998, 31 (04) : 35 - +
  • [9] Access and integrity control in a public-access, high-assurance configuration management system
    Shapiro, JS
    Vanderburgh, J
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 109 - 120
  • [10] CryptAttackTester: high-assurance attack analysis
    Bernstein, Daniel J.
    Chou, Tung
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT VI, 2024, 14925 : 141 - 182