Object Normal Form, Fourth Normal Form and Their Application to Database Security

Show simple item record

dc.contributor.author Link, Sebastian
dc.coverage.spatial Hyderabad, India
dc.date.accessioned 2022-11-09T00:56:45Z
dc.date.available 2022-11-09T00:56:45Z
dc.date.issued 2022-10-10
dc.identifier.citation (2022). Lecture notes in computer science, 13607, 349-364.
dc.identifier.isbn 9783031179945
dc.identifier.issn 1611-3349
dc.identifier.uri https://hdl.handle.net/2292/61766
dc.description.abstract An important question in database schema design concerns the effort required to maintain data consistency under updates. Similarly, an important question in database security concerns the effort required to maintain data confidentiality under inference attacks. Previous work has addressed these questions for the popular class of functional dependencies. In this paper, we will extend solutions to the more expressive class of multivalued dependencies. In particular, we will show that schemata in Fourth Normal Form with a unique minimal key require very little effort to maintain data consistency, and can guarantee confidentiality under inference attacks by access control only.
dc.publisher Springer Nature
dc.relation.ispartof International Conference on Conceptual Modelling
dc.relation.ispartofseries Conceptual Modeling - 41st International Conference, ER 2022, Proceedings
dc.rights Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher.
dc.rights This version of the contribution has been accepted for publication, after peer review (when applicable) but is not the Version of Record and does not reflect post-acceptance improvements, or any corrections. The Version of Record is available online at: http://doi.org/10.1007/978-3-031-17995-2_25 Use of this Accepted Version is subject to the publisher’s Accepted Manuscript terms of use https://www.springernature.com/gp/open-research/policies/accepted-manuscript-terms
dc.rights.uri https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm
dc.rights.uri https://www.springer.com/gp/computer-science/lncs/editor-guidelines-for-springer-proceedings
dc.title Object Normal Form, Fourth Normal Form and Their Application to Database Security
dc.type Conference Item
dc.identifier.doi 10.1007/978-3-031-17995-2_25
pubs.begin-page 349
pubs.volume 13607
dc.date.updated 2022-10-19T20:37:46Z
dc.rights.holder Copyright: The Author(s), under exclusive license to Springer Nature Switzerland AG en
pubs.end-page 364
pubs.finish-date 2022-10-20
pubs.publication-status Published
pubs.start-date 2022-10-17
dc.rights.accessrights http://purl.org/eprint/accessRights/RestrictedAccess en
pubs.subtype Proceedings
pubs.elements-id 922558
pubs.org-id Science
pubs.org-id School of Computer Science
dc.identifier.eissn 1611-3349
pubs.record-created-at-source-date 2022-10-20
pubs.online-publication-date 2022-10-10


Files in this item

There are no files associated with this item.

Find Full text

This item appears in the following Collection(s)

Show simple item record

Share

Search ResearchSpace


Browse

Statistics