High-assurance integrity techniques for databases

被引:0
|
作者
Bertino, Elisa [1 ]
Dai, Chenyun [1 ]
Lim, Hyo-Sang [1 ]
Lin, Dan [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increased need of data sharing among multiple organizations, such as government organizations, financial corporations, medical hospitals and academic institutions, it is critical to ensure data integrity so that effective decisions can be made based on these data. In this paper, we first present an architecture for a comprehensive integrity control system based on data validation and metadata management. We then discuss an important issue in the data validation, that is, the evaluation of data provenance and propose a trust model for estimating the trustworthiness of data and data providers. By taking into account confidence about data provenance, we introduce an approach for policy observing query evaluation as a complement to the integrity control system.
引用
下载
收藏
页码:244 / 256
页数:13
相关论文
共 50 条
  • [41] The Mechanized Marriage of Effects and Monads with Applications to High-assurance Hardware
    Reynolds, Thomas N.
    Procter, Adam
    Harrison, William L.
    Allwein, Gerard
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (01)
  • [42] Lessons Learned: Building the Caernarvon High-Assurance Operating System
    Karger, Paul A.
    McIntosh, Suzanne K.
    Palmer, Elaine R.
    Toll, David C.
    Weber, Samuel
    IEEE SECURITY & PRIVACY, 2011, 9 (01) : 22 - 30
  • [43] Experiment for high-assurance video conference system over the Internet
    Arai, M
    Kurosu, H
    Ohara, M
    Suzuki, R
    Fukumoto, S
    Iwasaki, K
    7TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2002, : 137 - 142
  • [44] Lessons Learned from Building a High-Assurance Crypto Gateway
    Weissman, Clark
    Levin, Timothy E.
    IEEE SECURITY & PRIVACY, 2011, 9 (01) : 31 - 39
  • [45] Software quality prediction for high-assurance network telecommunications systems
    Xu, ZW
    Khoshgoftaar, TM
    COMPUTER JOURNAL, 2001, 44 (06): : 557 - 568
  • [46] RefinedRust: A Type System for High-Assurance Verification of Rust Programs
    Gaeher, Lennard
    Sammler, Michael
    Jung, Ralf
    Krebbers, Robbert
    Dreyer, Derek
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2024, 8 (PLDI): : 1115 - 1139
  • [47] Increased information flow needs for high-assurance composite evaluations
    Karger, PA
    Kurth, H
    SECOND IEEE INTERNATIONAL INFORMATION ASSURANCE WORKSHOP, PROCEEDINGS, 2004, : 129 - 140
  • [48] Hints for High-Assurance Cyber-Physical System Design
    Pike, Lee
    2016 IEEE CYBERSECURITY DEVELOPMENT (IEEE SECDEV 2016), 2016, : 25 - 29
  • [49] CHORS: Hardening High-Assurance Security Systems with Trusted Computing
    Ozga, Wojciech
    Faqeh, Rasha
    Quoc, Do Le
    Gregor, Franz
    Dragone, Silvio
    Fetzer, Christof
    37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1626 - 1635
  • [50] An Effective Stackelberg Game for High-Assurance of Data Trustworthiness in WSNs
    Abdalzaher, Mohamed S.
    Seddik, Karim
    Muta, Osamu
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 1257 - 1262