Reading List in Information Security & Database
The lists are referenced from many famous educator in security and database area such as Ravi Sandhu, Sushil Jajodia, Ninghui Li, Lingyu Wang, etc. The list of basic papers are recommended for graduate student who
plan to conduct research in database or security. The list of advanced papers are
recommended for Ph.D candidate who wish to do creative works
in these areas. Widely readling is a key to excellent .works.
Basic Papers
- W. Diffie and M.E. Hellman. New directions in
cryptography. IEEE Transactions on Information Theory, Volume
22, Number 6, November 1976, pp. 644 - 654.
- S. Goldwasser and S. Micali. Probabilistic encryption. Journal of
Computer & System Sciences, Volume 28, Number 2, April 1984,
pp. 270-299.
- K. Thompson. Reflections on
Trusting Trust. Communication of the ACM, Vol. 27, No. 8, August
1984, pp. 761-763.
- J.H. Saltzer and M.D. Schroeder. Part I-A of The Protection of
Information in Computer Systems. Proceedings of the IEEE,
63(9):1278-1308, 1975.
The eight principles in Part I-A are as relevant today as they were back
then.
- L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals
Problem ACM Transactions on Programming Languages and Systems
4(3):382-401, July 1982.
Technically, this is not a security paper. However, it is a fundamental
paper of distributed computing, which is closely related to security.
- D.D. Clark and D.R. Wilson. "A
Comparison of Commercial and Military Computer Security Policies" In
Proceedings of the 1987 IEEE Symposium on Security and Privacy.
- R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-Based
Access Control Models. IEEE Computer, 29(2):38--47, February 1996.
- E. Spafford. "The Internet
Worm Program: An Analysis". Purdue Technical Report CSD-TR-823.
- S.M. Bellovin. "Security Problems in
the TCP/IP Protocol Suite" ACM Computer Communication Review, Volume
19 , Issue 2 (April 1989).
- D. Denning. "An
Intrusion-Detection Model". IEEE Transactions on Software
Engineering, Volume. SE-13, Number 2, February1987, pp. 222-232.
- V. Paxson. "Bro: A
System for Detecting Network Intruders in Real-Time, Computer
Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999.
- M. Abadi and R. Needham. Prudent Engineering
Practice for Cryptographic Protocols". IEEE Transactions on Software
Engineering. January 1996 (Vol. 22, No. 1)
- R. Anderson. "Why
Cryptosystems Fail". Communications of the ACM, 37(11):32-40,
November 1994.
- N. Borisov, I. Goldberg, D. Wagner. Intercepting Mobile
Communications: The Insecurity of 802.11, MOBICOM 2001.
Advanced Papers
Cryptography
- M. Blum and S. Micali. "How to generate cryptographically strong sequences
of pseudo-random bits". SIAM Journal on Computing, Volume 13, Issue 4
(November 1984), pages 850--864. Conference version in FOCS 1982.
Copy available in REC 217.
- S. Goldwasser, S. Micali, and C. Rackoff. "Knowledge complexity of
Interactive Proof Systems". SIAM Journal on Computing, Volume 18, Issue 1
(February 1989), pages 186--208. Conference version in STOC 1985.
- M. Bellare and P. Rogaway. Random oracles are
practical: a paradigm for designing efficient protocols. In Proceedings
of First ACM Conference on Computer and Communications Security (CCS), 1993.
- M. Bellare, A. Desai, D. Pointcheval and P. Rogaway. Relations among
notions of security for public-key encryption schemes. Extended abstract in
Advances in Cryptology - Crypto 98.
- Matt Franklin and Moti Yung. "Varieties of secure distributed
computing".
- P. Paillier. Public-Key
Cryptosystems Based on Composite Degree Residuosity Classes, EUROCRYPT 1999.
- A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or:
How to cope with perpetual leakage. In Crypto'95.
- D. Boneh and M. Franklin. "Identity-based encryption
from the Weil pairing" SIAM J. of Computing, Vol. 32, No. 3, pp.
586-615, 2003.
Extended abstract in proceedings of Crypto '2001, Lecture Notes in Computer
Science, Vol. 2139, Springer-Verlag, pp. 213-229, 2001.
- M. Bellare and O. Goldreich. "On defining proofs of
knowledge". In CRYPTO 1992.
Access Control
- Michael A. Harrison and Walter L. Ruzzo and Jeffrey D. Ullman. "Protection in Operating
Systems". CACM, August 1976.
- M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. "A calculus for access
control in distributed systems". ACM Transactions on Programming
Languages and Systems (TOPLAS). Volume 15, Issue 4 (September 1993), Pages:
706 - 734.
- M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust
Management. In Proc. of IEEE Symposium on Security and Privacy, 1996.
- R. L. Rivest and B. Lampson. SDSI --- A Simple
Distributed Security Infrastructure. Version 1.1.
- F.B. Schneider. Enforceable security
policies. ACM Transactions on Information and System Security
(TISSEC). Volume 3, Issue 1 (February 2000). Pages: 30 - 50
Other candidates
- E Bertino, E Ferrari, V Atluri. "The specification and enforcement of
authorization constraints in workflow management systems".
- R.S. Sandhu. "Lattice-based access control models".
- D. Sutherland. "A Model of Information"
- Goguen and Meseguer. "Unwinding and Inference Control"
- Goguen and Meseguer. "Security Policies and Security Models"
Database Security
- P.P. Griffiths and B.W. Wade. "An authorization
mechanism for a relational database system" ACM Transactions on Database
Systems (TODS), Volume 1 , Issue 3 (September 1976), Pages: 242 - 255.
- Nabil R. Adam, John C. Wortmann. "Security-control methods for statistical
databases: a comparative study"
- F Rabitti, E Bertino, W Kim, D Woelk. "A model of authorization for
next-generation database systems".
- P.
Ammann, S. Jajodia, P. Liu, Recovery
from Malicious Transactions, IEEE
Transactions on Knowledge and Data Engineering,
Vol. 15, No. 5, September 2002, pages 1167-1185.
Network Security and Intrusion Detection
- J.G. Steiner, B.C. Neuman, J.I. Schiller. "Kerberos: An
Authentication Service for Open Network Systems" In Usenix Conference
Proceedings, pp. 191--202, Mar. 1988.
- S.M. Bellovin, M Merritt. "Limitations of the
Kerberos Authentication System, ACM Computer Communications Review,
1991.
- B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in
Distributed Systems: Theory and Practice ACM Transactions on Computer
Systems (TOCS). Volume 10, Issue 4 (November 1992). Pages: 265 - 310.
- Practical Network Support for IP Traceback. Stefan Savage, David Wetherall,
Anna Karlin and Tom Anderson. SIGCOMM 2000.
- On the Effectiveness of Route-Based Packet Filtering for Distributed DoS
Attack Prevention in Power-Law Internets. Kihong Park, Heejo Lee. SIGCOMM 2001
- S. Forrest, A.S. Perelson, L. Allen, and R. Cherukuri Self-nonself
discrimination in a computer In 1994 IEEE Symposium on Security and Privacy.
- S. Forrest, S.A. Hofmeyr, A. Somayaji, T.A. Longstaff A sense of
self for Unix processes
- T. Ptacek and T. Newsham Insertion, Evasion,
and Denial of Service: Eluding Network Intrusion Detection
Systems Security
- M. Castro and B. Liskov. Practical Byzantine Fault
Tolerance. In Proceedings of the Third Symposium on Operating Systems
Design and Implementation (OSDI '99), New Orleans, USA, February 1999.
- R. Wahbe, S. Lucco, T.E. Anderson, and S.L. Graham. Efficient
software-based fault isolation Proceedings of the fourteenth ACM symposium
on Operating systems principles, Pages: 203 - 216, 1994.
Analysis of Cryptographic Protocols
- D. Dolev and A. Yao. "On the security of public key protocols"
- M Burrows, M Abadi, R Needham. "A logic of authentication"
- Gavin Lowe. "Breaking and fixing the Needham-Schroeder public-key protocol
using FDR"
- FJT Fabrega, JC Herzog, JD Guttman. "Strand spaces: Proving security
protocols correct"
Privacy and Anonymity
- Anonymous Connections and Onion Routing
- Freenet: A distributed anonymous information storage and retrieval system
- Crowds: Anonymity for web transactions
Defining Privacy
Databases and Data Integration
- Database
Encryption in Oracle 9i. Oracle Corporation (2001).
- Replacing
Personally-Identifying Information in Medical Records, the Scrub System. L.
Sweeney. In: Cimino, JJ, ed. Proceedings, Journal of the American Medical
Informatics Association. Washington, DC: Hanley & Belfus, Inc., 1996.
- Cryptography and
Relational Database Management Systems. J. He and M. Wang. IDEAS
2001.
- Practical Techniques for
Searches on Encrypted Data. D.X. Song, D. Wagner,
and A. Perrig.
IEEE Symposium on Research in Security and Privacy 2002.
- Executing
SQL over Encrypted Data in the Database-Service-Provider Model. H.
Hacigumus, B. Iyer, C. Li, and S. Mehrotra. SIGMOD 2002.
- Providing
Database as a Service. H. Hacigumus, B. Iyer, and S. Mehrotra. ICDE
2002.
- Hippocratic
Databases. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. VLDB 2002.
- Information
Sharing across Private Databases. R. Agrawal, A. Evfimievski, and R.
Srikant. SIGMOD 2003.
- Implementing P3P Using Database
Technology. R.Agrawal, J. Kiernan,
R. Srikant, and Y. Xu. ICDE 2003.
-
Server Centric
P3P. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. W3C Workshop on the
Future of P3P (2002)
-
Cardinality-based Inference Control in Data Cubes. L. Wang, D.
Wijesekera, and S. Jajodia. Journal of Computer Security (to appear).
-
OLAP Means On-line Anti-Privacy. L. Wang, D. Wijesekera, and
S. Jajodia. ISE Technical Report (2003).
- Precisely Answering Multi-dimensional Range Queries Without
Privacy Breaches. L. Wang, Y.J. Li, D. Wijesekera, and S. Jajodia.
ESORICS 2003.
- Cardinality-based Inference Control in Sum-only Data Cubes. L.
Wang, D. Wijesekera, and S. Jajodia. ESORICS 2002.
- Towards Secure XML
Federations. L. Wang, D. Wijesekera, and S. Jajodia. IFIP Working
Conference on Database and Application Security.
- A privacy enhanced microaggregation method, Y.J. Li, S.C. Zhu,
L. Wang, and S. Jajodia. Second International Symposium on Foundations of
Information and Knowledge Systems 2002.
- Auditing Interval Based Inference. Y.J. Li, L. Wang, S. Wang,
and S. Jajodia. The Fourteenth International Conference on Advanced
Information Systems Engineering 2002.
- Preventing
Interval Based Inferece By Random Data Perturbation. Y.J. Li, L. Wang, and
S. Jajodia. The Second Workshop on Privacy Enhancing Technologies 2002.
- A Cryptography-Flavored Approach to Privacy in Public
Databases (abstract)
(pdf) C. Dwork. ALADDIN Workshop on Privacy in
Data, 2003.
- Privacy-protecting statistic computation: theory and practice
(abstract)
(ppt) (pdf) R. Wright. ALADDIN Workshop on Privacy in
Data, 2003.
- Querying
Databases Privately. E. Kushilevitz. IBM Almaden Institute on Privacy in
Data Systems, 2003.
- Searchable Public Key
Encryption. D. Boneh, G. Di Crescenzo, R. Ostrovsky, and Giuseppe Persiano.
Cryptology ePrint Archive: Report 2003/195.
Data Mining
- Privacy-Preserving
Data Mining: A Randomization Approach. R. Srikant. IBM Almaden Institute
on Privacy in Data Systems, 2003.
-
Privacy-Preserving
Data Mining: A Cryptographic Approach. B. Pinkas. IBM Almaden Institute
on Privacy in Data Systems, 2003.
- Privacy preserving learning of decision trees (abstract)
(ppt) (pdf) B. Pinkas. ALADDIN Workshop on Privacy in
Data, 2003.
- On Privacy Breaches in Privacy-Preserving Data Mining
(abstract)
(pdf) J. Gehrke. ALADDIN Workshop on Privacy in
Data, 2003.
-
Privacy-Preserving
Data Mining, R. Agrawal and R. Srikant. SIGMOD 2000.
-
Privacy
Preserving Clustering By Data Transformation. Stanley R. M. Oliveira.
-
Privacy
Preserving Mining of Association Rules, A. Evfimievski, R. Srikant, R.
Agrawal, and J. Gehrke. SIGKDD 2002.
-
Maintaining
Data Privacy in Association Rule Mining. S.J. Rizvi and J.R. Haritsa.
VLDB 2002.
-
Limiting
Privacy Breaches in Privacy Preserving Data Mining. A. Evfimievski, J.
Gehrke, and R. Srikant. PODS 2003.
-
<Privacy
Preserving Data Mining, Y. Lindell and B. Pinkas, Journal of Cryptology
13 (2002).
-
Tools for
Privacy Preserving Distributed Data Mining
, C. Clifton, M. Kantarcioglu,
J. Vaidya, X. Lin, and M. Zhu. ACM SIGKDD Explorations 4 (2003).
-
Randomization
in Privacy-Preserving Data Mining A.
Evfimievski. ACM SIGKDD Explorations 4 (2003).
- Database
Privacy. M. Olivier. ACM
SIGKDD Explorations 4 (2003).
- Cryptographic
Techniques for Privacy-Preserving Data Mining. B. Pinkas. ACM SIGKDD Explorations 4
(2003).
- Approaches to distributed privacy protecting data mining (pdf) B. Prydatek. ALADDIN Workshop on Privacy in
Data, 2003.
- On the Design and
Quantification of Privacy Preserving Data Mining Algorithms. D. Agrawal and
C.C. Aggarwal. PODS 2001.
- A
Methodology for Hiding Knowledge in Databases. T. Johnsten and Vijay V.
Raghavan. Workshop on
Privacy, Security, and Data Mining 2002.
- Building
Decision Tree Classifier on Private Data. W, Du and Zhijun Zhan. Workshop on Privacy,
Security, and Data Mining 2002.
- Foundations
for an Access Control Model for Privacy Preservation in Multi-Relational
Association Rule Mining. S.R.M. Oliveira. Workshop on Privacy,
Security, and Data Mining 2002.
- Privacy
Preserving Frequent Itemset Mining. S.R.M. Oliveira. Workshop on Privacy,
Security, and Data Mining 2002.
Security and
Privacy Implications of Data Mining
, C. Clifton and D. Marks, DMKD
1996.
Developing Custom
Intrusion Detection Filters Using Data Mining.
C. Clifton and G. Gengo.
MILCOM 2000.
Using
Sample Size to Limit Exposure to Data Mining. C. Clifton.
Journal
of Computer Security 8 (2000).
Using Unknowns
to Prevent Discovery of Association Rules. Y. Saygin, V.S. Verykios, and C.
Clifton.
ACM SIGMOD Record 30 (2001).
Privacy
Preserving Association Rule Mining in Vertically Partitioned Data.
J.
Vaidya and C. Clifton. KDD 2002.
Privacy-Preserving K-Means
Clustering over Vertically Partitioned Data. J. Vaidya and C. Clifton.
KDD 2003.
Assuring
Privacy when Big Brother is Watching.
M. Kantarcioglu and C. Clifton.
DMKD 2003.
- Privacy
Preserving Data Mining over Vertically Partitioned Data. J. Vaidya. PhD
Thesis, 2003.
A new
architecture for Privacy Preserving Data Mining.
M. Kantarcioglu and J.
Vaidya. Privacy, Security and Data Mining, vol. 14, ACS Series Conferences in
Research and Practice in Information Technology.
Secure
Set Intersection Cardinality with Application to Association Rule
Mining
, C. Clifton and J. Vaidya. Under Review (Notes on use).
Privacy
Preserving Data Mining of Association Rules on Horizontally Partitioned
Data. M. Kantarcioglu and C. Clifton.
IEEE TKDE (to appear).
Statistical Databases
-
Controlled data-swapping
techniques for masking public use microdata sets. R.A. Moore, Jr.
SRD Report RR 96-04, U.S. Bureau of the Census, 1996.
- Census
Confidentiality and Privacy: 1790 - 2002. U.S. Bureau of the Census, 2002.
- The U.S. Census
Bureau Respects Your Privacy and Keeps Your Personal Information
Confidential. U.S. Bureau of the
Census, 2001.
-
Security
and Disclosure for Statistical Information. A. Westlake. IBM Almaden
Institute on Privacy in Data Systems, 2003.
-
Preserving Confidentiality AND Providing Adequate
Data for Statistical Modeling: The Role of Partial and Perturbed Data(abstract)
(ppt) (html) (pdf) S. Fienberg. ALADDIN Workshop on Privacy in
Data, 2003.
-
Protecting data through
'Perturbation' Techniques: Impact on the knowledge discovery process. R.L.
Wilson and P. A. Rosen. Journal of Database Management, 14(2), 14-26,
April-June 2003.
-
Revealing information while preserving privacy
(abstract)
(ppt) (html) (pdf) K Nissim. ALADDIN Workshop on Privacy in
Data, 2003.
-
On the Privacy of
Statistical Databases. I. Dinur and K. Nissim.
-
Revealing
Information while Preserving Privacy. I. Dinur and K. Nissim,
PODS 2003.
- Security of
Random Data Perturbation Methods. K. Muralidhar and R. Sarathy. ACM TODS
24 (1999).
- OLAP
and statistical databases: similarities and differences. A. Shoshani.
SIGMOD 1997.
-
Security-Control Methods for
Statistical Databases: A Comparative Study. N.R. Adam and J.C. Wortmann.
ACM Computing Surveys 21(1989).
-
A
data distortion by probability distribution. C.K. Liew, U.J. Choi, and C.J. Liew. TODS 10
(1985).
-
The
statistical security of a statistical database. J.F. Traub, Y. Yemini, and
H. Woʦniakowski. TODS 9 (1984).
-
Statistical databases: Characteristics,
problems and some solutions. A. Shoshani. VLDB
82.
-
Statistical
Database Design. F. Chin and G. Ozsoyoglu. TODS 6 (1981).
-
Auditing
for secure statistical databases. F. Chin and G. Ozsoyoglu. ACM 81
Conference (1981).
-
Suppression methodology and
statistical disclosure control. L.H. Cox. JASA 75 (1980).
-
A
Security Model for the Statistical Database Problem. D.E. Denning. TODS 5
(1980).
-
Secure
statistical databases with random sample queries. D.E. Denning. TODS 5
(1980).
-
A
fast procedure for finding a tracker in a statistical database. D.E.Denning. TODS 5 (1980).
-
The
tracker: a threat to statistical database security. D.E Denning, P.J.
Denning, and M. Schwartz. TODS 4 (1979).
-
Privacy in Statistical Databases
(PSD 2004) Conference
Private Information Retrieval
-
Survey Talk: Private Information
Retrieval. A. Beimal (2003).
- Private
Information Retrieval - An overview and current trends. D. Asonov.
INDOCRYPT 2001.
-
Private
Information Retrieval. B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan,
FOCS 95.
-
Computationally
private information retrieval. B. Chor and N. Gilboa. STOC 97.
- Replication Is Not
Needed: Single Database, Computationally-Private Information Retrieval, E.
Kushilevitz and R. Ostrovsky. FOCS 97.
- Protecting Data
Privacy in Private Information Retrieval Schemes. Y. Gertner, Y. Ishai, E.
Kushilevitz, and T. Malkin. STOC 98.
- Private information
retrieval by keywords. B. Chor, N. Gilboa, and M. Naor. Report 98-03,
Theory of Cryptography Library, 1998.
- One-way Functions
are Essential for Single-Server Private Information Retrieval. A. Beimel, Y.
Ishai, E. Kushilevitz, and T. Malkin. STOC 99.
- Improved
Upper Bounds on Information-Theoretic Private Information Retrieval. Y.
Ishai and E. Kushilevitz. STOC 99.
- Computationally
private information retrieval with polylogarithmic communication. C. Cachin,
S. Micali, and M. Stadler. Computationally private information retrieval with
polylogarithmic communication. EUROCRYPT 1999.
- One-way Trapdoor
Permutations Are Sufficient for Non-Trivial Single-Server Private Information
Retrieval. E. Kushilevitz and R. Ostrovsky. EuroCrypt 2000.
- Reducing the
Servers Computation in Private Information Retrieval: PIR with
Preprocessing. A. Beimel, Y. Ishai, and T. Malkin. CRYPTO 2000,
- On symmetrically private information retrieval. S.K. Mishra. Master's
Thesis, Indian Statistical Institute (2000).
- Information-Theoretic
Private Information Retrieval: A Unified Construction. A. Beimel and Y.
Ishai. ICALP 2001.
- Breaking the
O(n^{1/(2k-1)}) Barrier for Information-Theoretic Private Information. A.
Beimel, Y. Ishai, E. Kushilevitz, and J.F. Raymond. FOCS 2002.
- Robust
Information-Theoretic Private Information Retrieval. A. Beimel and Y. Stahl.
3rd Conference on Security in Communication Networks, 2002.
- Privacy-Preserving
Indexing of Documents on the Network. M. Bawa, R.J. Bayardo Jr., and R.
Agrawal. VLDB 2003.
-
Building
Secure Indexes for Searching Efficiently on Encrypted Compressed
Data. Eu-Jin Goh
(2003).
Copyright © GeFu All rights reserved