68 ◾ Secure Data Provenance and Inference Control
6.4 Inference Strategies and Examples
A user may employ different inference strategies in order to arrive at new infor-
mation from the available background information and answers to all previous
queries. When the newly inferred information is private, we say the confidentiality
of the system is compromised. To prevent the release of the confidential informa-
tion, a first step is to identify the possible inference strategies available to the user
(uraisingham and Ford 1991; uraisingham et al. 1993).
Inference by deductive reasoning. In this strategy, new information is inferred
using well-formed rules. is strategy allows deriving β as a consequence of α. In
other words, deductive reasoning i ...