{"title":"动态数据作为对跟踪器的威慑","authors":"Miguel Cabrera, E. A. Unger","doi":"10.1145/99412.99423","DOIUrl":null,"url":null,"abstract":"Security measures in small and personal computer systems are exacerbated by the limited resources available. Inference of information from databases on any system is one security concern which involves breaches by authorized users of the system. One class of intrusion tools known as trackers has been extensively studied and several deterrent methods created. Most such deterrents, however, are not feasible solutions to the inference breach on small or personal computer systems because of the large amount of resource required to implement them. Natural or artificial dynamism of the contents of the database does provide a deterrent to trackers. This paper reports a study on the quantification of the deterrent value of making changes to records in a database against compromise with the general tracker. Information on the deterrent value of increasing the frequency of change, the number of attributes in the records, and the number of records in the database can provide a useful management tool to managers of small computers and networked PCs.","PeriodicalId":147067,"journal":{"name":"Symposium on Small Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dynamic data as deterrent to the tracker\",\"authors\":\"Miguel Cabrera, E. A. Unger\",\"doi\":\"10.1145/99412.99423\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security measures in small and personal computer systems are exacerbated by the limited resources available. Inference of information from databases on any system is one security concern which involves breaches by authorized users of the system. One class of intrusion tools known as trackers has been extensively studied and several deterrent methods created. Most such deterrents, however, are not feasible solutions to the inference breach on small or personal computer systems because of the large amount of resource required to implement them. Natural or artificial dynamism of the contents of the database does provide a deterrent to trackers. This paper reports a study on the quantification of the deterrent value of making changes to records in a database against compromise with the general tracker. Information on the deterrent value of increasing the frequency of change, the number of attributes in the records, and the number of records in the database can provide a useful management tool to managers of small computers and networked PCs.\",\"PeriodicalId\":147067,\"journal\":{\"name\":\"Symposium on Small Systems\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1990-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Symposium on Small Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/99412.99423\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Symposium on Small Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/99412.99423","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security measures in small and personal computer systems are exacerbated by the limited resources available. Inference of information from databases on any system is one security concern which involves breaches by authorized users of the system. One class of intrusion tools known as trackers has been extensively studied and several deterrent methods created. Most such deterrents, however, are not feasible solutions to the inference breach on small or personal computer systems because of the large amount of resource required to implement them. Natural or artificial dynamism of the contents of the database does provide a deterrent to trackers. This paper reports a study on the quantification of the deterrent value of making changes to records in a database against compromise with the general tracker. Information on the deterrent value of increasing the frequency of change, the number of attributes in the records, and the number of records in the database can provide a useful management tool to managers of small computers and networked PCs.