
Introduction ◾ 11
1.6 Next Steps
is chapter has provided an introduction to the book. We first provided a brief
overview of the supporting technologies for secure data provenance and inference
control. en we discussed our motivation, contributions, and approaches for
securing provenance data. We also discussed inference control with respect to data
provenance. is was followed by a discussion of the contents of this book.
e inference problem has been studied since the 1980s, starting with statistical
databases followed by multilevel databases and more recently for health care data-
bases. Some of the developments made on the inference problem ...