CSC 405 Introduction to Computer Security

Size: px
Start display at page:

Download "CSC 405 Introduction to Computer Security"

Transcription

1 omputer Science S 45 Introduction to omputer Security Topic 6.: Database Inference ontrol Outline Inference attacks Direct attacks (no inference needed) Indirect attacks via aggregations Tracker attacks Inference via linear systems Inference via database constraints Inference control Limited Response Suppression ombining results Random sample Random data perturbation Query analysis omputer Science

2 Direct ttacks Name Sex Race id ines Drugs Dorm dams 5 45 ailey hin Dewitt 5 Earhart 95 ein 5 Groff 4 Hill 5 Koch Liu ajors Query List NE Where SEX= ^ DRUGS= Results: omputer Science Direct ttacks (ont d) Name dams ailey hin Dewitt Earhart ein Groff Hill Koch Liu ajors Sex Query List NE where (SEX= ^ DRUGS=) (SEX!= ^ SEX!=) (DOR=YRES) Result= omputer Science Race id ines Drugs Dorm 4

3 Direct ttacks (ont d) Protect against direct attacks n items over k percent rule Data should be withheld if n items represent over k% of the result reported. dopted by U.S. ensus ureau Intuition: do not reveal results where a small number of records make up a large proportion of the category. Release only statistics Examples: sum, average, count, etc. omputer Science 5 Indirect ttacks via ggregations Sums of inancial id by Dorm and Sex Total Total 8 emale Students Living in Name Liu Try to infer a sensitive value from a reported sum. What can we infer for the female students living in? s financial aid = omputer Science 6

4 Indirect ttacks via ggregations (ont d) ount of inancial id by Dorm and Sex Total 5 6 Total 4 4 ale Students Living in or Name dams Groff Dorm With additional counts, what can we further infer? s financial aid = s financial aid = omputer Science 7 Tracker ttacks DS protection llow aggregation of sensitive attributes only when the number of data items that constitute the aggregate is more than a threshold t. Trackers defeats this protection by using additional queries. omputer Science 8 4

5 Tracker ttacks (ont d) Name Sex Race id ines Drugs Dorm dams 5 45 ailey hin Dewitt 5 Earhart 95 ein 5 Groff 4 Hill 5 Koch Liu ajors Query Sum ((Sex=) ^ (Race=) ^ (Dorm=)) Is this allowed? omputer Science 9 Tracker ttacks (ont d) sum (a^b^c) = sum(a) sum (a^ (b^c)) sum ((Sex=) ^ (Race=) ^ (Dorm=)) is equivalent to sum (Sex=) sum ((Sex=)^(Race!= Dorm!= ) omputer Science 5

6 Tracker ttacks (ont d) Name Sex Race id ines Drugs Dorm dams 5 45 ailey hin Dewitt 5 Earhart 95 ein 5 Groff 4 Hill 5 Koch Liu ajors ount ((Sex=) ^ (Race=) ^ (Dorm=)) = = omputer Science Tracker ttacks (ont d) q() is disallowed = ^ T= ^ ~ Tracker q()=q() q(t) omputer Science 6

7 Inference via Linear Systems Generalization of the Tracker attacks We can get a sequence of linear equations through a sequence of queries Variables: sensitive values Q = c + c + c + c4 + c5 Q = c + c + c4 Q = c + c4 Q4 = c4 + c5 Q5 = c + c5 5 = ((Q Q) (Q Q4))/. omputer Science Inference via Database onstraints Integrity constraints Database dependencies Key integrity omputer Science 4 7

8 Integrity onstraints =+ =public, =public, and =secret can be calculated from and, i.e., secret information can be calculated from public data omputer Science 5 Database Dependencies Knowledge about the database could be used to make inference unctional dependencies ulti-valued dependencies Join dependencies etc. omputer Science 6 8

9 unctional Dependency D:, that is for any two tuples in the relation, if they have the same value for, they must have the same value for. Example: D: Rank Salary Secret information: Name and Salary together Query: Name and Rank Query: Rank and Salary ombine answers for query and to reveal Name and Salary together omputer Science 7 Inference ontrols Two ways Suppression Sensitive data values are not provided Query is rejected without response oncealing The answer provided is close to but not exactly the actual value. oth can be applied to either queries or individual items within the database. omputer Science 8 9

10 Limited Response Suppression Suppression technique Eliminate low-frequency elements Not always work. Student by Dorm and Sex Total Total 4 4 What are the suppressed values? omputer Science 9 ombining Results Suppression techniques ombine rows or columns to protect sensitive values. Present results in ranges Rounding Students by Sex and Drug Use Sex Drug Use Sex or Drug Use or omputer Science

11 Random Sample oncealing technique Use random sample of the database to answer queries. The same sample set should be chosen for equivalent queries. Prevent averaging attacks omputer Science Random Data Perturbation oncealing technique Perturb the values of the database by a small error. Statistical measures such as sum and mean will be close. Easier than random sample. omputer Science

12 Query nalysis Suppression technique Decide whether a result should be provided through analyzing queries and their implications. Need to maintain a query history Difficult to know what a user knows from out-ofband ways. omputer Science ethodologies of Inference ontrol Suppress obviously sensitive information Easy to do, but tend to be over restrictive Track what user knows Very expensive Query history annot deal with conspiracy Disguise data Sacrifice the quality of data omputer Science 4

13 onclusions No general technique is available to solve the problem Need assurance of protection Hard to incorporate outside knowledge omputer Science 5

Computer Security (EDA263 / DIT 641)

Computer Security (EDA263 / DIT 641) Computer Security (EDA263 / DIT 641) Lecture in EDA263: Database Security Erland Jonsson Department of Computer Science and Engineering Chalmers University of Technology Sweden Outline Introduction to

More information

Database and Data Mining Security

Database and Data Mining Security Database and Data Mining Security 1 Threats/Protections to the System 1. External procedures security clearance of personnel password protection controlling application programs Audit 2. Physical environment

More information

Database Security. Database Security Requirements

Database Security. Database Security Requirements Database Security Laurie Williams williams@csc.ncsu.edu John Slankas John_Slankas@ncsu.edu Physical database integrity Logical database integrity Element integrity Auditability Access Control User Authentication

More information

Computer Security (EDA263 / DIT 641)

Computer Security (EDA263 / DIT 641) Computer Security (EDA263 / DIT 641) Lecture 12: Database Security Erland Jonsson Department of Computer Science and Engineering Chalmers University of Technology Sweden Outline Introduction to databases

More information

MULTILATERAL SECURITY. Based on chapter 9 of Security Engineering by Ross Anderson

MULTILATERAL SECURITY. Based on chapter 9 of Security Engineering by Ross Anderson MULTILATERAL SECURITY Based on chapter 9 of Security Engineering by Ross Anderson עומר פפרו Paparo Presenter: Omer Outline Introduction Motivation Data flow models Compartmentation and the lattice model

More information

DATA MINING - 1DL360

DATA MINING - 1DL360 DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure

More information

Database Security. Sarajane Marques Peres, Ph.D. University of São Paulo www.each.usp.br/sarajane

Database Security. Sarajane Marques Peres, Ph.D. University of São Paulo www.each.usp.br/sarajane Database Security Sarajane Marques Peres, Ph.D. University of São Paulo www.each.usp.br/sarajane Based on Elsmari x Navathe / Silberschatz, Korth, Sudarshan s books Types of security Legal and ethical

More information

INFO/CS 330: Applied Database Systems

INFO/CS 330: Applied Database Systems INFO/CS 330: Applied Database Systems Introduction to Database Security Johannes Gehrke johannes@cs.cornell.edu http://www.cs.cornell.edu/johannes Introduction to DB Security Secrecy:Users should not be

More information

Adverse Impact Ratio for Females (0/ 1) = 0 (5/ 17) = 0.2941 Adverse impact as defined by the 4/5ths rule was not found in the above data.

Adverse Impact Ratio for Females (0/ 1) = 0 (5/ 17) = 0.2941 Adverse impact as defined by the 4/5ths rule was not found in the above data. 1 of 9 12/8/2014 12:57 PM (an On-Line Internet based application) Instructions: Please fill out the information into the form below. Once you have entered your data below, you may select the types of analysis

More information

Class 19: Two Way Tables, Conditional Distributions, Chi-Square (Text: Sections 2.5; 9.1)

Class 19: Two Way Tables, Conditional Distributions, Chi-Square (Text: Sections 2.5; 9.1) Spring 204 Class 9: Two Way Tables, Conditional Distributions, Chi-Square (Text: Sections 2.5; 9.) Big Picture: More than Two Samples In Chapter 7: We looked at quantitative variables and compared the

More information

Database security. André Zúquete Security 1. Advantages of using databases. Shared access Many users use one common, centralized data set

Database security. André Zúquete Security 1. Advantages of using databases. Shared access Many users use one common, centralized data set Database security André Zúquete Security 1 Advantages of using databases Shared access Many users use one common, centralized data set Minimal redundancy Individual users do not have to collect and maintain

More information

Database Security. The Need for Database Security

Database Security. The Need for Database Security Database Security Public domain NASA image L-1957-00989 of people working with an IBM type 704 electronic data processing machine. 1 The Need for Database Security Because databases play such an important

More information

DATA MINING - 1DL105, 1DL025

DATA MINING - 1DL105, 1DL025 DATA MINING - 1DL105, 1DL025 Fall 2009 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht09 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,

More information

B A S I C S C I E N C E S

B A S I C S C I E N C E S B A S I C S C I E N C E S 10 B A S I C S C I E N C E S F I R S T S E M E S T E R C O U R S E S : H U M A N S T R U C T U R E A N D F U N C T I O N [ H S F I ] M O L E C U L A R B A S I S O F M E D I C

More information

Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21

Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21 Security and Authorization Chapter 21 Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke 1 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed

More information

Is it statistically significant? The chi-square test

Is it statistically significant? The chi-square test UAS Conference Series 2013/14 Is it statistically significant? The chi-square test Dr Gosia Turner Student Data Management and Analysis 14 September 2010 Page 1 Why chi-square? Tests whether two categorical

More information

Automated SEO. A Market Brew White Paper

Automated SEO. A Market Brew White Paper Automated SEO A Market Brew White Paper Abstract In this paper, we use the term Reach to suggest the forecasted traffic to a particular webpage or website. Reach is a traffic metric that describes an expected

More information

Database Security. Chapter 21

Database Security. Chapter 21 Database Security Chapter 21 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can t see other students grades. Integrity: Users should

More information

Ch.5 Database Security. Ch.5 Database Security Review

Ch.5 Database Security. Ch.5 Database Security Review User Authentication Access Control Database Security Ch.5 Database Security Hw_Ch3, due today Hw_Ch4, due on 2/23 Review Questions: 4.1, 4.3, 4.6, 4.10 Problems: 4.5, 4.7, 4.8 How about the pace of the

More information

EXAM. Exam #3. Math 1430, Spring 2002. April 21, 2001 ANSWERS

EXAM. Exam #3. Math 1430, Spring 2002. April 21, 2001 ANSWERS EXAM Exam #3 Math 1430, Spring 2002 April 21, 2001 ANSWERS i 60 pts. Problem 1. A city has two newspapers, the Gazette and the Journal. In a survey of 1, 200 residents, 500 read the Journal, 700 read the

More information

DATABASE SECURITY - ATTACKS AND CONTROL METHODS

DATABASE SECURITY - ATTACKS AND CONTROL METHODS DATABASE SECURITY - ATTACKS AND CONTROL METHODS Emil BURTESCU 1 PhD, Associate Professor, Department of Accounting and Management Informatics, University of Pitesti, Pitesti, Romania E-mail: emil.burtescu@yahoo.com,

More information

How to Select a National Student/Parent School Opinion Item and the Accident Rate

How to Select a National Student/Parent School Opinion Item and the Accident Rate GUIDELINES FOR ASKING THE NATIONAL STUDENT AND PARENT SCHOOL OPINION ITEMS Guidelines for sampling are provided to assist schools in surveying students and parents/caregivers, using the national school

More information

Query 0BBP_INV_Q002 - Invoices per Vendor

Query 0BBP_INV_Q002 - Invoices per Vendor Query 0BBP_INV_Q002 - Invoices per Vendor Query Properties System: BIC Query: 0BBP_INV_Q002, Invoices per Vendor Version: 7.x InfoProvider: 0BBP_INV Author: C5020319 Key Date: - Last changed by: USER10

More information

Intro to Data Analysis, Economic Statistics and Econometrics

Intro to Data Analysis, Economic Statistics and Econometrics Intro to Data Analysis, Economic Statistics and Econometrics Statistics deals with the techniques for collecting and analyzing data that arise in many different contexts. Econometrics involves the development

More information

CS346: Advanced Databases

CS346: Advanced Databases CS346: Advanced Databases Alexandra I. Cristea A.I.Cristea@warwick.ac.uk Data Security and Privacy Outline Chapter: Database Security in Elmasri and Navathe (chapter 24, 6 th Edition) Brief overview of

More information

Capturing Database Transformations for Big Data Analytics

Capturing Database Transformations for Big Data Analytics Capturing Database Transformations for Big Data Analytics David Sergio Matusevich University of Houston Organization Introduction Classification Program Case Study Conclusions Extending ER Models to Capture

More information

CHAPTER 13 SIMPLE LINEAR REGRESSION. Opening Example. Simple Regression. Linear Regression

CHAPTER 13 SIMPLE LINEAR REGRESSION. Opening Example. Simple Regression. Linear Regression Opening Example CHAPTER 13 SIMPLE LINEAR REGREION SIMPLE LINEAR REGREION! Simple Regression! Linear Regression Simple Regression Definition A regression model is a mathematical equation that descries the

More information

Workbook 2 Overheads

Workbook 2 Overheads Contents Highlights... 2 Quick Practice Session on Overheads... 2 Financial Quiz 2 - Overheads... 3 Learning Zone Overheads... 3 Fixed and Variable costs and Break-even analysis explained... 3 Fixed Costs...

More information

COSC344 Database Theory and Applications. Lecture 23 Security and Auditing. COSC344 Lecture 23 1

COSC344 Database Theory and Applications. Lecture 23 Security and Auditing. COSC344 Lecture 23 1 COSC344 Database Theory and Applications Lecture 23 Security and Auditing COSC344 Lecture 23 1 Overview Last Lecture Indexing This Lecture Database Security and Auditing Security Mandatory access control

More information

Choices, choices, choices... Which sequence database? Which modifications? What mass tolerance?

Choices, choices, choices... Which sequence database? Which modifications? What mass tolerance? Optimization 1 Choices, choices, choices... Which sequence database? Which modifications? What mass tolerance? Where to begin? 2 Sequence Databases Swiss-prot MSDB, NCBI nr dbest Species specific ORFS

More information

Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University schung@cs.wright.

Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University schung@cs.wright. Database Security Soon M. Chung Department of Computer Science and Engineering Wright State University schung@cs.wright.edu 937-775-5119 Goals of DB Security Integrity: Only authorized users should be

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 5 Database Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Database Security 1 Relational Databases constructed

More information

IBM SPSS Statistics for Beginners for Windows

IBM SPSS Statistics for Beginners for Windows ISS, NEWCASTLE UNIVERSITY IBM SPSS Statistics for Beginners for Windows A Training Manual for Beginners Dr. S. T. Kometa A Training Manual for Beginners Contents 1 Aims and Objectives... 3 1.1 Learning

More information

IBM SPSS Direct Marketing 23

IBM SPSS Direct Marketing 23 IBM SPSS Direct Marketing 23 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 23, release

More information

PRIVACY IN STATISTICAL DATABASES: AN APPROACH USING CELL SUPPRESSION NEELABH BAIJAL. Department of Computer Science

PRIVACY IN STATISTICAL DATABASES: AN APPROACH USING CELL SUPPRESSION NEELABH BAIJAL. Department of Computer Science PRIVACY IN STATISTICAL DATABASES: AN APPROACH USING CELL SUPPRESSION NEELABH BAIJAL Department of Computer Science APPROVED: Luc Longpré, Ph.D. Vladik Kreinovich, Ph.D. Martine Ceberio, Ph.D. Scott Starks,

More information

IBM SPSS Direct Marketing 22

IBM SPSS Direct Marketing 22 IBM SPSS Direct Marketing 22 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 22, release

More information

Guide To Your USAA Investment Management Company Understanding Your USAA Mutual Fund IRS Form 1099-B For Tax Year 2013

Guide To Your USAA Investment Management Company Understanding Your USAA Mutual Fund IRS Form 1099-B For Tax Year 2013 Guide To Your USAA Investment Management Company Understanding Your USAA Mutual Fund IRS Form 1099-B For Tax Year IRS Form 1099-B Proceeds from Brokers and Barter Exchange Transactions The amounts indicated

More information

CS2Bh: Current Technologies. Introduction to XML and Relational Databases. The Relational Model. The relational model

CS2Bh: Current Technologies. Introduction to XML and Relational Databases. The Relational Model. The relational model CS2Bh: Current Technologies Introduction to XML and Relational Databases Spring 2005 The Relational Model CS2 Spring 2005 (LN6) 1 The relational model Proposed by Codd in 1970. It is the dominant data

More information

Knowledge Discovery and Data Mining. Structured vs. Non-Structured Data

Knowledge Discovery and Data Mining. Structured vs. Non-Structured Data Knowledge Discovery and Data Mining Unit # 2 1 Structured vs. Non-Structured Data Most business databases contain structured data consisting of well-defined fields with numeric or alphanumeric values.

More information

Functional Dependencies and Finding a Minimal Cover

Functional Dependencies and Finding a Minimal Cover Functional Dependencies and Finding a Minimal Cover Robert Soulé 1 Normalization An anomaly occurs in a database when you can update, insert, or delete data, and get undesired side-effects. These side

More information

Overview of Component Search System SPARS-J

Overview of Component Search System SPARS-J Overview of omponent Searc System Tetsuo Yamamoto*,Makoto Matsusita**, Katsuro Inoue** *Japan Science and Tecnology gency **Osaka University ac part nalysis part xperiment onclusion and Future work Motivation

More information

5.5. Solving linear systems by the elimination method

5.5. Solving linear systems by the elimination method 55 Solving linear systems by the elimination method Equivalent systems The major technique of solving systems of equations is changing the original problem into another one which is of an easier to solve

More information

DALHOUSIE NOTES ON PAYROLL EXPENSE DETAIL IN FINANCE SELF SERVICE. QUICK REFERENCE As of September 1, 2015

DALHOUSIE NOTES ON PAYROLL EXPENSE DETAIL IN FINANCE SELF SERVICE. QUICK REFERENCE As of September 1, 2015 DALHOUSIE NOTES ON PAYROLL EXPENSE DETAIL IN FINANCE SELF SERVICE QUICK REFERENCE As of September 1, 2015 Quick reference document outlining the basic steps to access the payroll expense detail results

More information

August 2009. Page 1 PSA-2014-00177

August 2009. Page 1 PSA-2014-00177 August 2009. Page 1 Page 2 Citizens' Services (Kim Henderson) Introduction to Employee Engagement Engagement Scores at a Glance Your work unit Your organization 76 72 Employee engagement is a concept that

More information

CHAPTER IV FINDINGS AND CONCURRENT DISCUSSIONS

CHAPTER IV FINDINGS AND CONCURRENT DISCUSSIONS CHAPTER IV FINDINGS AND CONCURRENT DISCUSSIONS Hypothesis 1: People are resistant to the technological change in the security system of the organization. Hypothesis 2: information hacked and misused. Lack

More information

End-to-end Protection of Web Services. Tracking. Hao Chen and Benjamin Davis UC Davis. Web services are highly attractive targets

End-to-end Protection of Web Services. Tracking. Hao Chen and Benjamin Davis UC Davis. Web services are highly attractive targets End-to-end Protection of Web Services with Information Flow Tracking Hao Chen and Benjamin Davis UC Davis MURI Final Review Briefing June 13, 2012 Helix MURI Project -- http://helix.cs.virginia.edu Web

More information

This Course. Modelling and Analysing of Security Protocol: Lecture 1. Introductions to Modelling Protocols. Course Outline. Course Outline.

This Course. Modelling and Analysing of Security Protocol: Lecture 1. Introductions to Modelling Protocols. Course Outline. Course Outline. Modelling and nalysing of Security Protocol: Lecture 1 Introductions to Modelling Protocols Tom Chothia CWI This Course This course will primarily teaching you: How to design your own secure communication

More information

SUBQUERIES AND VIEWS. CS121: Introduction to Relational Database Systems Fall 2015 Lecture 6

SUBQUERIES AND VIEWS. CS121: Introduction to Relational Database Systems Fall 2015 Lecture 6 SUBQUERIES AND VIEWS CS121: Introduction to Relational Database Systems Fall 2015 Lecture 6 String Comparisons and GROUP BY 2! Last time, introduced many advanced features of SQL, including GROUP BY! Recall:

More information

Canadian Individual Critical Illness Insurance Morbidity Experience

Canadian Individual Critical Illness Insurance Morbidity Experience Morbidity Study Canadian Individual Critical Illness Insurance Morbidity Experience Between Policy Anniversaries in 2002 and 2007 Using Expected CIA Incidence Tables from July 2012 Individual Living Benefits

More information

Engineering Problem Solving and Excel. EGN 1006 Introduction to Engineering

Engineering Problem Solving and Excel. EGN 1006 Introduction to Engineering Engineering Problem Solving and Excel EGN 1006 Introduction to Engineering Mathematical Solution Procedures Commonly Used in Engineering Analysis Data Analysis Techniques (Statistics) Curve Fitting techniques

More information

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy

More information

Math/Stat 394 Homework 2

Math/Stat 394 Homework 2 Math/Stat 39 Homework Due Wednesday Jan 18 1. Six awards are to be given out among 0 students. How many ways can the awards be given out if (a one student will win exactly five awards. (b one student will

More information

03 The full syllabus. 03 The full syllabus continued. For more information visit www.cimaglobal.com PAPER C03 FUNDAMENTALS OF BUSINESS MATHEMATICS

03 The full syllabus. 03 The full syllabus continued. For more information visit www.cimaglobal.com PAPER C03 FUNDAMENTALS OF BUSINESS MATHEMATICS 0 The full syllabus 0 The full syllabus continued PAPER C0 FUNDAMENTALS OF BUSINESS MATHEMATICS Syllabus overview This paper primarily deals with the tools and techniques to understand the mathematics

More information

The Relational Model. Why Study the Relational Model?

The Relational Model. Why Study the Relational Model? The Relational Model Chapter 3 Instructor: Vladimir Zadorozhny vladimir@sis.pitt.edu Information Science Program School of Information Sciences, University of Pittsburgh 1 Why Study the Relational Model?

More information

Database Design and Database Programming with SQL - 5 Day In Class Event Day 1 Activity Start Time Length

Database Design and Database Programming with SQL - 5 Day In Class Event Day 1 Activity Start Time Length Database Design and Database Programming with SQL - 5 Day In Class Event Day 1 Welcome & Introductions 9:00 AM 20 Lecture 9:20 AM 40 Practice 10:00 AM 20 Lecture 10:20 AM 40 Practice 11:15 AM 30 Lecture

More information

Procedia Computer Science 00 (2012) 1 21. Trieu Minh Nhut Le, Jinli Cao, and Zhen He. trieule@sgu.edu.vn, j.cao@latrobe.edu.au, z.he@latrobe.edu.

Procedia Computer Science 00 (2012) 1 21. Trieu Minh Nhut Le, Jinli Cao, and Zhen He. trieule@sgu.edu.vn, j.cao@latrobe.edu.au, z.he@latrobe.edu. Procedia Computer Science 00 (2012) 1 21 Procedia Computer Science Top-k best probability queries and semantics ranking properties on probabilistic databases Trieu Minh Nhut Le, Jinli Cao, and Zhen He

More information

Implementation exercises for the course Heuristic Optimization

Implementation exercises for the course Heuristic Optimization Implementation exercises for the course Heuristic Optimization 1 jeremie.dubois-lacoste@ulb.ac.be IRIDIA, CoDE, ULB February 25, 2015 1 Slides based on last year s excersises by Dr. Franco Mascia. Implement

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

More information

BI Requirements Checklist

BI Requirements Checklist The BI Requirements Checklist is designed to provide a framework for gathering user requirements for BI technology. The framework covers, not only the obvious BI functions, but also the follow-up actions

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

ALGEBRA 2/TRIGONOMETRY

ALGEBRA 2/TRIGONOMETRY ALGEBRA /TRIGONOMETRY The University of the State of New York REGENTS HIGH SCHOOL EXAMINATION ALGEBRA /TRIGONOMETRY Tuesday, June 1, 011 1:15 to 4:15 p.m., only Student Name: School Name: Print your name

More information

Linear Codes. Chapter 3. 3.1 Basics

Linear Codes. Chapter 3. 3.1 Basics Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length

More information

Question 2: How do you solve a matrix equation using the matrix inverse?

Question 2: How do you solve a matrix equation using the matrix inverse? Question : How do you solve a matrix equation using the matrix inverse? In the previous question, we wrote systems of equations as a matrix equation AX B. In this format, the matrix A contains the coefficients

More information

DEPARTMENT OF HEALTH AND HUMAN SERVICES

DEPARTMENT OF HEALTH AND HUMAN SERVICES Minimum Value Calculator Methodology DEPARTMENT OF HEALTH AND HUMAN SERVICES Patient Protection and Affordable Care Act; Minimum Value Calculator Methodology AGENCY: Department of Health and Human Services

More information

Cloud and Big Data Summer School, Stockholm, Aug. 2015 Jeffrey D. Ullman

Cloud and Big Data Summer School, Stockholm, Aug. 2015 Jeffrey D. Ullman Cloud and Big Data Summer School, Stockholm, Aug. 2015 Jeffrey D. Ullman 2 In a DBMS, input is under the control of the programming staff. SQL INSERT commands or bulk loaders. Stream management is important

More information

How To Create A Table In Sql 2.5.2.2 (Ahem)

How To Create A Table In Sql 2.5.2.2 (Ahem) Database Systems Unit 5 Database Implementation: SQL Data Definition Language Learning Goals In this unit you will learn how to transfer a logical data model into a physical database, how to extend or

More information

National specific template Log NS.09 best estimate assumptions for life insurance risks

National specific template Log NS.09 best estimate assumptions for life insurance risks National specific template Log NS.09 best estimate assumptions for life insurance risks CELL(S) ITEM INSTRUCTIONS N/A General Comment This template is applicable to life insurers and life reinsurers. The

More information

CS3220 Lecture Notes: QR factorization and orthogonal transformations

CS3220 Lecture Notes: QR factorization and orthogonal transformations CS3220 Lecture Notes: QR factorization and orthogonal transformations Steve Marschner Cornell University 11 March 2009 In this lecture I ll talk about orthogonal matrices and their properties, discuss

More information

Recognizing and resolving Chasm and Fan traps when designing universes

Recognizing and resolving Chasm and Fan traps when designing universes Recognizing and resolving Chasm and Fan traps when designing universes Relational databases can return incorrect results due to limitations in the way that joins are performed in relational databases.

More information

SECURE UNIVERSES USING RESTRICTION SETS

SECURE UNIVERSES USING RESTRICTION SETS SECURE UNIVERSES USING RESTRICTION SETS Dallas J. Marks BREAKOUT INFORMATION Secure Universes Using Restriction Sets Do you need to tailor universe security to specific users or groups within your organization?

More information

2. Basic Relational Data Model

2. Basic Relational Data Model 2. Basic Relational Data Model 2.1 Introduction Basic concepts of information models, their realisation in databases comprising data objects and object relationships, and their management by DBMS s that

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

Access Control Matrix

Access Control Matrix Access Control Matrix List all proceses and files in a matrix Each row is a process ( subject ) Each column is a file ( object ) Each matrix entry is the access rights that subject has for that object

More information

Problem of the Month The Wheel Shop

Problem of the Month The Wheel Shop Problem of the Month The Wheel Shop The Problems of the Month (POM) are used in a variety of ways to promote problem solving and to foster the first standard of mathematical practice from the Common Core

More information

Overview. Database Security. Relational Database Basics. Semantic Integrity Controls. Access Control Rules- Name dependent access

Overview. Database Security. Relational Database Basics. Semantic Integrity Controls. Access Control Rules- Name dependent access Database ecurity ione FischerHübner Applied ecurity, DAVC7 Overview eantic Integrity Controls Access Control Rules Multilevel ecure Databases RBAC in Coercial DBM tatistical Database ecurity Relational

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Module outline. CS 458 / 658 Computer Security and Privacy. (Relational) Databases. Module outline. Module 6 Database Security and Privacy.

Module outline. CS 458 / 658 Computer Security and Privacy. (Relational) Databases. Module outline. Module 6 Database Security and Privacy. Module outline CS 458 / 658 Computer Security and Privacy Module 6 Database Security and Privacy Fall 2008 1 Introduction to databases 2 Security requirements 3 Data disclosure and inference 4 Multilevel

More information

Anti-Gaming in the OnePipe Optimal Liquidity Network

Anti-Gaming in the OnePipe Optimal Liquidity Network 1 Anti-Gaming in the OnePipe Optimal Liquidity Network Pragma Financial Systems I. INTRODUCTION With careful estimates 1 suggesting that trading in so-called dark pools now constitutes more than 7% of

More information

Calculating P-Values. Parkland College. Isela Guerra Parkland College. Recommended Citation

Calculating P-Values. Parkland College. Isela Guerra Parkland College. Recommended Citation Parkland College A with Honors Projects Honors Program 2014 Calculating P-Values Isela Guerra Parkland College Recommended Citation Guerra, Isela, "Calculating P-Values" (2014). A with Honors Projects.

More information

Relational Database: Additional Operations on Relations; SQL

Relational Database: Additional Operations on Relations; SQL Relational Database: Additional Operations on Relations; SQL Greg Plaxton Theory in Programming Practice, Fall 2005 Department of Computer Science University of Texas at Austin Overview The course packet

More information

10 th POLISH SUDOKU CHAMPIONSHIP INSTRUCTION BOOKLET. February 22, 2015 IMPORTANT INFORMATION:

10 th POLISH SUDOKU CHAMPIONSHIP INSTRUCTION BOOKLET. February 22, 2015 IMPORTANT INFORMATION: 10 th POLISH SUDOKU CHAMPIONSHIP February 22, 2015 INSTRUCTION BOOKLET IMPORTANT INFORMATION: 1. Answer form can be sent many times, but only the last version will be considered. 2. In case of a tie, the

More information

CS 458 / 658 Computer Security and Privacy. Module outline. Module outline. Module 6 Database Security and Privacy. Winter 2010

CS 458 / 658 Computer Security and Privacy. Module outline. Module outline. Module 6 Database Security and Privacy. Winter 2010 CS 458 / 658 Computer Security and Privacy Module 6 Database Security and Privacy Winter 2010 Module outline 1 Introduction to databases 2 Security requirements 3 Data disclosure and inference 4 Multilevel

More information

Solving Systems of Linear Equations Using Matrices

Solving Systems of Linear Equations Using Matrices Solving Systems of Linear Equations Using Matrices What is a Matrix? A matrix is a compact grid or array of numbers. It can be created from a system of equations and used to solve the system of equations.

More information

Database Design and Normal Forms

Database Design and Normal Forms Database Design and Normal Forms Database Design coming up with a good schema is very important How do we characterize the goodness of a schema? If two or more alternative schemas are available how do

More information

Utilizing Microsoft Excel for Human Resources Management By Palani Murugappan

Utilizing Microsoft Excel for Human Resources Management By Palani Murugappan Utilizing Microsoft Excel for Human Resources Management By Palani Murugappan Employee driven organization Far sighted employers will definitely agree that employees are the greatest asset of an organization.

More information

Databases -Normalization III. (N Spadaccini 2010 and W Liu 2012) Databases - Normalization III 1 / 31

Databases -Normalization III. (N Spadaccini 2010 and W Liu 2012) Databases - Normalization III 1 / 31 Databases -Normalization III (N Spadaccini 2010 and W Liu 2012) Databases - Normalization III 1 / 31 This lecture This lecture describes 3rd normal form. (N Spadaccini 2010 and W Liu 2012) Databases -

More information

An Informal Survey of Calculus and Physics requirements in Engineering Technology. Harvey Lyons and M. L. Brake. School of Engineering Technology

An Informal Survey of Calculus and Physics requirements in Engineering Technology. Harvey Lyons and M. L. Brake. School of Engineering Technology An Informal Survey of Calculus and Physics requirements in Engineering Technology Harvey Lyons and M. L. Brake School of Engineering Technology Eastern Michigan University Ypsilanti, MI 48197 hlyons@emich.edu

More information

Information Security and Risk Management

Information Security and Risk Management Information Security and Risk Management by Lawrence D. Bodin Professor Emeritus of Decision and Information Technology Robert H. Smith School of Business University of Maryland College Park, MD 20742

More information

Chapter 14. Web Extension: Financing Feedbacks and Alternative Forecasting Techniques

Chapter 14. Web Extension: Financing Feedbacks and Alternative Forecasting Techniques Chapter 14 Web Extension: Financing Feedbacks and Alternative Forecasting Techniques I n Chapter 14 we forecasted financial statements under the assumption that the firm s interest expense can be estimated

More information

The Relational Model. Why Study the Relational Model? Relational Database: Definitions

The Relational Model. Why Study the Relational Model? Relational Database: Definitions The Relational Model Database Management Systems, R. Ramakrishnan and J. Gehrke 1 Why Study the Relational Model? Most widely used model. Vendors: IBM, Microsoft, Oracle, Sybase, etc. Legacy systems in

More information

BM482E Introduction to Computer Security

BM482E Introduction to Computer Security BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based

More information

Privacy Preserving Outsourcing for Frequent Itemset Mining

Privacy Preserving Outsourcing for Frequent Itemset Mining Privacy Preserving Outsourcing for Frequent Itemset Mining M. Arunadevi 1, R. Anuradha 2 PG Scholar, Department of Software Engineering, Sri Ramakrishna Engineering College, Coimbatore, India 1 Assistant

More information

Hidden Markov Models

Hidden Markov Models 8.47 Introduction to omputational Molecular Biology Lecture 7: November 4, 2004 Scribe: Han-Pang hiu Lecturer: Ross Lippert Editor: Russ ox Hidden Markov Models The G island phenomenon The nucleotide frequencies

More information

PROC LOGISTIC: Traps for the unwary Peter L. Flom, Independent statistical consultant, New York, NY

PROC LOGISTIC: Traps for the unwary Peter L. Flom, Independent statistical consultant, New York, NY PROC LOGISTIC: Traps for the unwary Peter L. Flom, Independent statistical consultant, New York, NY ABSTRACT Keywords: Logistic. INTRODUCTION This paper covers some gotchas in SAS R PROC LOGISTIC. A gotcha

More information

Lecture 6. SQL, Logical DB Design

Lecture 6. SQL, Logical DB Design Lecture 6 SQL, Logical DB Design Relational Query Languages A major strength of the relational model: supports simple, powerful querying of data. Queries can be written intuitively, and the DBMS is responsible

More information

Degeneracy in Linear Programming

Degeneracy in Linear Programming Degeneracy in Linear Programming I heard that today s tutorial is all about Ellen DeGeneres Sorry, Stan. But the topic is just as interesting. It s about degeneracy in Linear Programming. Degeneracy? Students

More information

DATA VALIDATION and CONDITIONAL FORMATTING

DATA VALIDATION and CONDITIONAL FORMATTING DATA VALIDATION and CONDITIONAL FORMATTING Data validation to allow / disallow certain types of data to be entered within a spreadsheet Using Data Validation to choose a value for a cell from a dropdown

More information

Shut down management For Coal handling plant of thermal power station A New Approach 1.0 Abstract: - 2.0 Introduction: -

Shut down management For Coal handling plant of thermal power station A New Approach 1.0 Abstract: - 2.0 Introduction: - Shut down management or oal handling plant of thermal power station New pproach y Makarand Joshi 1.0 bstract: - Shut down can be defined as scheduled down period for a plant for scheduled maintenance for

More information