dc.contributor.author |
Link, Sebastian |
|
dc.coverage.spatial |
Hyderabad, India |
|
dc.date.accessioned |
2022-11-09T00:56:45Z |
|
dc.date.available |
2022-11-09T00:56:45Z |
|
dc.date.issued |
2022-10-10 |
|
dc.identifier.citation |
(2022). Lecture notes in computer science, 13607, 349-364. |
|
dc.identifier.isbn |
9783031179945 |
|
dc.identifier.issn |
1611-3349 |
|
dc.identifier.uri |
https://hdl.handle.net/2292/61766 |
|
dc.description.abstract |
An important question in database schema design concerns the effort required to maintain data consistency under updates. Similarly, an important question in database security concerns the effort required to maintain data confidentiality under inference attacks. Previous work has addressed these questions for the popular class of functional dependencies. In this paper, we will extend solutions to the more expressive class of multivalued dependencies. In particular, we will show that schemata in Fourth Normal Form with a unique minimal key require very little effort to maintain data consistency, and can guarantee confidentiality under inference attacks by access control only. |
|
dc.publisher |
Springer Nature |
|
dc.relation.ispartof |
International Conference on Conceptual Modelling |
|
dc.relation.ispartofseries |
Conceptual Modeling - 41st International Conference, ER 2022, Proceedings |
|
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. |
|
dc.rights |
This version of the contribution has been accepted for publication, after peer review (when applicable) but is not the Version of Record and does not reflect post-acceptance improvements, or any corrections. The Version of Record is available online at: http://doi.org/10.1007/978-3-031-17995-2_25 Use of this Accepted Version is subject to the publisher’s Accepted Manuscript terms of use https://www.springernature.com/gp/open-research/policies/accepted-manuscript-terms |
|
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
|
dc.rights.uri |
https://www.springer.com/gp/computer-science/lncs/editor-guidelines-for-springer-proceedings |
|
dc.title |
Object Normal Form, Fourth Normal Form and Their Application to Database Security |
|
dc.type |
Conference Item |
|
dc.identifier.doi |
10.1007/978-3-031-17995-2_25 |
|
pubs.begin-page |
349 |
|
pubs.volume |
13607 |
|
dc.date.updated |
2022-10-19T20:37:46Z |
|
dc.rights.holder |
Copyright: The Author(s), under exclusive license to Springer Nature Switzerland AG |
en |
pubs.end-page |
364 |
|
pubs.finish-date |
2022-10-20 |
|
pubs.publication-status |
Published |
|
pubs.start-date |
2022-10-17 |
|
dc.rights.accessrights |
http://purl.org/eprint/accessRights/RestrictedAccess |
en |
pubs.subtype |
Proceedings |
|
pubs.elements-id |
922558 |
|
pubs.org-id |
Science |
|
pubs.org-id |
School of Computer Science |
|
dc.identifier.eissn |
1611-3349 |
|
pubs.record-created-at-source-date |
2022-10-20 |
|
pubs.online-publication-date |
2022-10-10 |
|