Richard J. Lipton - Database Security

Database Security

Lipton studied and created database security models on how and when to restrict the queries made by users of a database such that private or secret information will not be leaked. Even when the user is restricted to only read operations on a database, secure information could be at risk. For example, querying a database of campaign donations could allow the user to discover the individual donations to political candidates or organizations. If given access to averages of data and unrestricted query access, a user could exploit the properties of those averages to gain illicit information. These queries are considered to have large "overlap" creating the insecurity. By bounding the "overlap" and number of queries, a secure database can be achieved.

Read more about this topic:  Richard J. Lipton

Famous quotes containing the word security:

    There is one safeguard known generally to the wise, which is an advantage and security to all, but especially to democracies as against despots. What is it? Distrust.
    Demosthenes (c. 384–322 B.C.)