
209
Chapter 15
Inference Control through
Query Modification
15.1 Overview
e query modification technique has been used in the past to handle discretionary
security and views (Stonebraker 1975). is technique has been extended to include
mandatory security in Dwyer et al. (1987). In our design of the query processor, this
technique is used by the inference engine to modify the query depending on the secu-
rity constraints, the previous responses released, and real-world information. When the
modified query is posed, the response generated will not violate security.
Consider the architecture for the inference controller discussed in Chapter 11.
e in ...