Protecting deductive databases from unauthorized retrieval and update requests.
Steve BarkerPublished in: Data Knowl. Eng. (2002)
Keyphrases
- deductive databases
- update propagation
- integrity constraints
- logic programming
- query evaluation
- fixpoint
- disjunctive deductive databases
- constraint checking
- closed world assumption
- declarative language
- semantic query optimization
- integrity checking
- declarative semantics
- hypothetical reasoning
- model theoretic
- data protection
- stable models
- access control
- high level
- artificial intelligence
- data mining
- logic programs