338 ◾ Secure Data Provenance and Inference Control
redaction manager, and the information sharing manager, in making this determi-
nation. e results of the risk manager are then given to the access control manager,
the redaction manager, and the information snaring manager to execute the results.
e adversarial data miner. is module will implement the strategies we have
discussed in Chapter 19. In particular, it will determine how to thwart the adver-
sary as well as apply game theoretics, mathematical programming, and probabilis-
tic deduction in determining what information is to be released to the user. It will
work jointly with the inference engine.
23.3 The Global Inference Controller
Our global inference controller should determine unauthori ...