Honest Databases That Can Keep Secrets

نویسندگان

  • Ravi S. Sandhu
  • Sushil Jajodia
چکیده

Polyinstantiation has generated a great deal of controversy lately. Some have argued that polyinstantiation and integrity are fundamentally incompatible, and have proposed alternatives to polyinstantiation. Others have argued about the correct de nition of polyinstantiation and its operational semantics. In this paper we provide a fresh analysis of the basic problem that we are trying to solve, i.e., how can a honest database keep secrets? Our analysis leads us to the concept of restricted polyinstantiation wherein we show how to solve this problem without compromising on any of the following requirements: secrecy, integrity, availability-of-service, element-level labeling and high assurance. This is the rst solution to meet all these requirements simultaneously.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Positive Incentives for Protecting Secrets in Digital Rights Management

A common problem to current DRM-based services that usually offer streaming digital content and support period pricing (monthly or yearly subscription) systems is how to prevent secret (e.g., account and password) sharing beyond authorized consumers. Traditional technical solutions such as binding the secrets with specific devices can only solve this problem to some extent at the cost of user’s...

متن کامل

Eliminating polyinstantiation securely

Polyinstantiation has generated a great deal of controversy lately. Some have argued that pol~nstantia~on and integriry are fundamentally incompatible, and have proposed alternatives to polyinstantiation. Others have argued about the correct definition of polyinstantiation and its operational semantics. In this paper we provide a fresh analysis of the basic problem that we are rrying ro solve; ...

متن کامل

مسؤولیت مدنی ناشی از افشای اسرار پزشکی در حقوق ایران‌ و‌ کامن‌لا

Revealing medical secrets is one of the most important topics in medical law, and has an ancient root in medical history and morality. Keeping patients' secrets is one of the certain laws in internal and international laws and regulations of the most countries that have been recognized in patients' bill of rights. Keeping patients' secrets causes patients to confide in physicians and refer to t...

متن کامل

On the Feasibility of Consistent Computations

In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to formalize this type of corruption. In the current paper, we refine their model to get stronger security guarantees. Namely, we show how to construct protocols, where malicious participants cannot learn anything beyond ...

متن کامل

How to Collaborate between Threshold Schemes

Threshold schemes have been used to protect secrets by distributing shares to participants. To protect two secrets, we can use two separate traditional schemes, say, a (t1, n1) scheme and a (t2, n2) scheme. If there are u (≤min(t1, t2) ) participants involved in both schemes, each of these u participants must keep two different shares. This paper proposes a method that allows each common partic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1991