Secure Databases: Protection Against User Influence
|
|
|
- Della Nicholson
- 10 years ago
- Views:
Transcription
1 Secure Databases: Protection Against User Influence DAVID DOBKIN University of Arizona ANITA K. JONES Carnegie-Mellon University RICHARD J. LIPTON Yale University Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here. Key Words and Phrases: database, security, protection, information flow, inference, compromise, statistical query CR Categories: 13.5, 4.33, INTRODUCTION In computer systems we encode information in databases. We often want to control what information a user can obtain from these databases. For example, we may wish to control the use of a census database so that, although it contains records describing individuals, only statistical information is available. No sequence of queries should be sufficient to deduce exact information about any individual described in the database. Determining and then enforcing a policy specifying what information in a database can be given in response to queries is the database security problem [6,7]. Security is also an issue for operating systems; unfortunately, the solutions for operating systems are not sufficient to solve the database security problem. Most operating system protection mechanisms are access control mechanisms [5], that is, they enforce rules about who can perform what operation or access what Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or specific permission. This work was supported in part by the Office of Naval Research under Grant NOOO14-75-C-0450, in part by the National Science Foundation under Contract DCR , and in part by the National Science Foundation under Contract DCR Authors addresses: D. Dobkin, Department of Computer Science, University of Arizona, Tucson, AZ 85721; A. K. Jones, Department of Computer Science, Carnegie-Mellon University, Pittsburgh, PA 15213; R. J. Lipton, Department of Computer Science, Yale University, New Haven, CT ACM /79/ $00.75 ACM Transactions on Database Systems, Vol. 4, No. 1, March 1979, Pages
2 98 - D. Dobkin, A. K. Jones, and R. J. Lipton information. For example, users can access file objects via READ, WRITE, SORT, DELETE FILE, or APPEND. But different users may be permitted different access to individual fties. While user A may be permitted to READ and WRITE File X, user B may be able only to READ and APPEND it. And user A may be permitted only to READ File Y, while user B may both READ and WRITE that one. There are two common schemes for effecting such protection mechanisms; one is the authority list mechanism used in most file systems (e.g., the MULTICS file system [ 111) and the other is the capability mechanism [9, 11, 121. In operating systems, protection mechanisms allow different users different access to an object; they allow some users to read part or all of the contents of a file and others to alter it in perhaps limited ways. We consider databases in which all users are essentially performing read access. An access control mechanism that only distinguishes between read and alter accesses is not useful. Thus the operating system approach is not sufficient for the database problem. Another contrast between databases and operating systems concerns queries that involve many data elements. In the operating system, a complex operation can be broken down into a set of accesses to individual objects and each access permission determined independently of the others. In a database, a decision must be made whether the entire query should be permitted in the first place. This decision depends not only on the relationship of data elements being interrogated but also on the query history, the information that has already been divulged to the user. Newer access control mechanisms take into account the flow of information out of one object and into another as part of the effect of an access. These access control mechanisms incorporate remembering the source from which information encoded in an object was derived [3, 4, 81. Yet even such sophisticated mechanisms make no interpretation of the content of the database and have no notion of a history of information already given out. We conclude that such mechanisms are not appropriate tools for solving the database security problem. Table I Contributing group Amount Steel 270,000 sugar 120,000 Oil 540,000 Democrats 186,ooO Republicans 564,000 Independents 180,000 High favoritism 510,000 Low favoritism 174,000 Medium favoritism 246,000 Northeast West 9f-J~ 330, ,000
3 Secure Databases - 99 Let us now restate the database security problem: There is a set of data elements in the database called the UNKNOWN set that user U is not permitted to know. For some reason, perhaps as a result of previous queries, user U knows a set of data elements called the KNOWN set. Some elements in KNOWN may not be explicitly encoded in the database. User U asks a sequence of queries ql, Qz, ***, qn and enlarges his set of KNOWN data elements. The security of the database is compromised if the KNOWN and the UNKNOWN sets intersect. We will now proceed by introducing an example to highlight the issues germane to database security. Example. The following data describe fund raising for major political parties. Cl,... ) C9 are specific contributors with the following attributes: Contributor Cl a c3 c4 c5 CT?3 c7 C&3 c9 Business area Steel Steel Steel sugar sugar sugar Oil Oil Oil Political leaning Democrat Republican Independent Democrat Republican Independent Democrat Republican Independent Favoritism shown by administration High Medium Low Medium Low High Low High Medium Geographic area Northeast West South Northeast Northeast West South South West Suppose that the only data that can be obtained from the database is the sum given by all contributors sharing a common attribute-contributions from the steel industry (Cl + C2 + C3) or contributions from those with Republican leanings (C2 + C5 + CB). The information that can be obtained from all possible queries is listed in Table I. The political fund database is considered secure if the precise contribution of an inidividual cannot be determined. Is this database secure? No, we can compute that Cl gave $60,000. Values for contributors C2,..., C9 can also be computed on the basis of the query responses listed in Table I. We are interested in obtaining criteria that allow us to determine exactly when a database can be compromised. 2. BASIC CONCEPTS We are interested in the question of determining the security of databases. We now define precisely what this means by presenting a general model. This model is an abstraction of the concept of database; we do not suggest that it be used in place of, say, the relational database model [l]. But we do propose this model as realistic for our discussion. Definition. A database D is a function from (1,..., n} to N, the natural numbers. n is the number of elements or objects in the database; N is the set of possible attributes. In our fund-raising example, D (1) is $60,000. D ( i) is the contribution of Ci. We will often use the following notation for databases. Instead of defining D explicitly
4 100 * D. Dobkin, A. K. Jones, and R. J. Lipton we just say that {&,..., &} is a database. We mean of course that D(i) = di for 15i5n. We will now define query and compromise. Definition. Fix n as the number of objects in the database. A query q is a function of n variables. If D = {d,,..., d,} is a database and q is a query, then q(d) = q(d1,..., dn) is the result of the query q on the database D. Inourexampleq(di,..., dg) is an allowed query provided q(dl,.... ck) =kc, dk where A is a set of contributors that corresponds to an entry in Table I. Thus there are exactly 12 queries of this form. A security problem has several components: (1) A particular database D = {dl,..., d,} is given. (2) A subset Do of D is given. We interpret di E Do as meaning that di is known to the user before he begins his queries. (3) A set of queries is given. We assert that not all sets of queries are allowed. (In Section 3 we restrict the overlap of queries.) Given these components, we are to determine whether or not there is an allowed sequence of queries that can determine the value of some DO. Thus a sequence of allowed queries ql,..., q,,, compromises a database provided there is an i such that, for any database D with the same responses to the queries Ql,..., qm as D, di = dl (D = {dl,..., dn } ). Our claim that Cl gave $60,000 is equivalent to the statement: Any database with the same responses to the 12 queries of Table I must have D(1) = $60,000. Our definition of a security problem has two important features. First, we allow that a user may know in advance parts of the database. For example, suppose that Cl s contribution is known in advance. Then two queries suffice to determine the contribution of C6 as C6 = sugar - northeast + Cl. Second, we allow that not all sequences of queries may be permitted. Suppose that a particular database allows averages of size k and a user knows just one value. Then in just two queries he can compromise the database. He asks: (1) What is the average of X, yl,..., y&l? (2) What is the average of x, yl,..., y&i? If he already knows X, he can determine x. The reason the user was so successful is that he was allowed to ask two queries that overlapped greatly; his queries overlapped in k - 1 elements. In the next section we will consider the problem of whether one can compromise such a database if no two average queries can overlap very much. 3. APPLICATIONS TO A PARTICULAR MODEL: AVERAGES In this section, we assume that we are given a database {xl,..., x,} of numbers and that queries may be made about the sum of any subset of the database
5 Secure Databases * 101 consisting of exactly k elements (this is equivalent to averages of k-element sets). We assume the further restriction that no two queries may overlap in more than r positions. And we assume that the values of xl,..., XI are known in advance by the user (0 5 I< k - 1). We then wish to study the behavior of the quantity S( n, k, r, I), the smallest number of queries that suffices to compromise the database. Compromising the database will consist of generating the value of one previously unknown element, e.g., x1+1. Before proceeding, we present some sample values of the function S (n, k, r, I). Example. S(n, 3,2,0) 5 4, n S- 4. Let the queries be Q1, Qz, Q3, Q4 where Q, = x, + x2 + x3 Q2 = x, + x2 Q3 = x, + x3 + x4 + x4 Q4 = xz + x3 + x4. Then x4 can be found as $( -2Q1 + QZ + Q3 + Q4) and this is optimal. Example. S( n, 4, 1, 1) I 6, n r 11. Let the queries be Q1,..., Q6 where Q, = x1 + x3 + x4 + x5 Q2 = XI + xs + x7 + x8 93 = xl +x9+x,0 + xl, Q4 = x2 + x3 + xc + x9 Qr, = x2 + x4 + x7 + xlo Qs=xz+x5+xs+x,,. Then ~[(QI + QZ + Q3) - (Q4 + QS + Q6)l = xl - XZ, which yields the value of x2 since xl is known. We begin our study of the properties of the function S by establishing a lower bound on its value. THEOREM 1. S(n, k, r, I) I 1 + (k - (Z+ l))/r. PROOF. Suppose that after t queries we can determine the value of XI+~, and let the queries be represented as Qi = Jil $3 i=1,...,t for 1s 6 <... <ik(nwhereweassumetheset {ii,...,&} rl ~,,...,j~} has at most r members. This can then be represented as being able to satisfy the relation i, aiqi =i Pi% (1) in terms of coefficients of the xi with j3 [+I # 0. We proceed now by a counting argument, observing that the left-hand side of (1) can be rewritten as
6 102 - D. Dobkin, A. K. Jones, and R. J. Lipton where SiO is 1 if x, belongs to query i and 0 otherwise. Thus t must be such that at most I + 1 of the terms,$, ajbp a=l,...,n are nonzero. In order for such a term to be zero, it must be the case thatsio = 0, i = 1,...) t, or that i, j are distinct such that Sim = S,O = 1. Thus every X, that appears in some query must appear in at least two queries for a > I+ 1. After the first query k Xi have been accessed, and (k - ( 1+ 1 ))/r more queries are required to access all the xi ( i > 2 + 1) at least twice, since at most r of these elements can occur in each new query due to the overlap restriction. Hence t I 1 + (k - (I + l))/r is a lower bound for S(n, k, r, 1). 0 As a dividend of the argument above, we observe that k - pr new variables of the database are added in the p + lth query, 1 I p 5 (k - (I + l))/r, and thus the following corollary results, giving a lower limit on the size of a database which can be compromised. COROLLARY. If n < k2/2r -t- k/2 + (I + 1)/2 - ((I + U2)/2r, then S( n, k, r, I) = CC corresponding to a noncompromisible database. PROOF. This follows from the argument above since k+ kw g:) r (k - ir) = C - 1 +!-$I - I!$?. 2r 2 These results provide, then, a measure of the limitations of compromising a database. We turn next to the question of actually implementing algorithms to perform these functions in order to get a sense of the tightness of these bounds. THEOREM 2. (a) S(n, k, 1, 0) 5 2k - 1, nrk2-k+l (b) S(n, k, 1, 1) I 2k - 2, n 2 (k - 1)2 + 2 (c) S( n, kr + a, r, 2a - 1) 5 2k, nrk2r+2a (d) S(n, kr, r, r- 1) rs(n, k, l,o), n 2 rk. PROOF. In each case, our proof consists of an algorithm that performs the given task within the desired bound. (a) Let the queries be (see Figure la) Then Qi= i Xk,(i-l)+j, i = 1,..., k - 1 j-l Qk+i-1 = c xk(i-l)+i + X@-k+l, i = 1,..., k. j=l z. Qk+i - C Qi i=l k (b) Let the queries be (see Figure lb) Qi = Xl + C x()(i-l)+jp j=z k Q+i = c xl+i+(i-l)(k-1) + X(k-1)2+2, j=l = x@-k+l. i = 1,..., i = 1,..., k - 1.
7 Secure Databases Q Qh XI x2 XkZ-2+1 * * Xk?-k w-m+1 I Xkd-k+l XkZ-Zk+Z xk k+l &-1 Xh X2k X11-k Xk2-k+1. Fig. la. The queries for Theorem 2(a) QM XI X()(k-2) X(k-INR--2)+b Qk X2 a+1 Xlk-N-2)+2 -b-1)*+2 Qa+l * x3 x1+2 Xl&l)(k-2)+3 X(k-1P+2 QZk-2 xk X2&1 X(H-?l+k q-v+2 Fig. lb. The queries for Theorem 2(b) Then Jl (Qi - Q+i) = x1 - XC&1P+2 and x(~-~)z+~ may be determined since x1 is known in advance. (c) Let the queries be kr u Qi = C ar(i-l)+j + x mr+l, i= l,...,k. j=l 1-l k r a Qk+i = C 2 Xkrti-l)+(i-l)r+l+ 2 ~~~r+ol+m i = 1,... ) k. ;=1 1=1 m-l
8 104 * D. Dobkin, A. K. Jones, and R. J. Lipton Then il ( Qi - Qh+i) = k i xh2r+l - i xk%+u+m I=1 m=l I and xk++l can be determined if the values of XG.+L~+~,..., xk++r+u, mr+m+1,..., XkZ,+%, are known in advance. (d) This statement follows by letting yi = x+l),+l xi,., 1 li I k2 - k + 1 using an algorithm for S (n, k, 1, 0) to find yl, and using known valuesofxl,..., xrel and yl to find x1. The reason we are interested in the results of this section is that we feel they are hard evidence of how complex it will be to secure a database. The complex and obscure techniques used in Theorem 2 to crack the database demonstrate how difficult it will be to determine whether a series of simple queries can compromise a database. On the other hand, Theorem 1 points out that there do exist mechanisms (bounding the overlap and the number of queries) that can protect a database. 4. APPLICATIONS TO A PARTICULAR MODEL: MEDIANS In this section we assume that we are given a database {x1,..., x~} of distinct numbers and that queries can be made about the median of k elements for some fixed odd k. A median query q (yl,,.., yk) returns the median s value but not which yi is equal to this value. We also assume that no values are known in advance. We then wish to study the quantity M(n, k), the smallest number of queries that suffices to determine some element of the database perfectly. Our main result is the following theorem. THEOREM 3. M(n, k) 5 3/2(k + 1) + 2prouided n 2 k + 2. PROOF. Letp = (k + 1)/2. Also let x1,..., xk+p be k + 2 objects of the database. First perform all possible k medians involving the objects x1,..., $&+I. Clearly k+l there are k such medians. These medians result in exactly two answers, ( ) say h and 1 with h < 1. Let and H = {xi [ xi 5 h} L = {Xi 1 Xi 2 I}. Then Xi E H iff the median of {xl,..., rk+1) - {Xi} is I; Xi E L iff the median is h. An easy argument shows that 1 H( = ) L 1 = p. We now form the median of H U L U {xh+z!} where There are three cases: (1) The answer = 1. Then Xk+Z < 1. (2) The answer > 1. Then xk+2 > 1. (3) The answer < 1. This is impossible. H = H - any two elements of H. As observed in [2], this assumption is not very restrictive.
9 Secure Databases Thus this query determines whether xk+2 > or < 1. Without loss of generality assume that xk+2 < 1. We now fix LO as a set of p - 1 elements of L. Let us finally examine the medians of the sets H U {x&+2) U LO - {Xi} for each Xi E H U {X&+2}. We now claim that one median (say m) occurs p times and one median occurs once. This follows by a simple argument. Then m = Xi where xz is not in the set when m does not occur. cl This result demonstrates clearly that even the simple operation of median can be used to compromise a database; indeed, this can be done in very few queries. 5. CONCLUSIONS A precise model of the security problem for databases has been presented. In this model we were able to demonstrate how to control the queries a user could make in order to stop him from compromising the database. While we did this only for queries about averages and medians, we can extend the model to handle queries of other types. This model gives rise to a number of interesting combinatorial problems which have applications to problems of applicability to designers or databases. While we have presented an introduction to problems in this area here, a number of related problems remain open. For example, suppose we change our constraints on overlapping queries to ahow queries to overlap only in certain coordinates. Or, suppose we allow queries of varying lengths. Or, suppose we may ask for medians but wish to determine a specific database entry. Furthermore, in each case studied here, we have considered worst case behavior, the number of queries necessary to guarantee that the database is compromised. We could do a similar analysis for best case behavior, asking for the fewest queries after which the database may be compromised. Many of these issues will be studied in a forthcoming paper [2]. ACKNOWLEDGMENT We wish to thank Rich DeMillo, Mary-Claire van Leunen, and Steven Reiss for a number of helpful comments on an earlier draft. REFERENCES 1. CODD, E.F. A relational model of data for large and shared data banks. Comm ACM 13, 6 (June 1970), DEMILLO, R., DOBKIN, D., AND LIPTON, R. Even data bases that lie can be compromised. IEEE Trans. Software Eng. SE-4, 1 (1978), DENNING, D.E. A lattice model of secure information flow. Comm. ACM 19, 5 (May 1976), FENTON, J.S. Memoryless subsystems. Comptr. J. 17, 2 (1974), GRAHAM, G.S., AND DENNING, P.J. Protection-principles and practice. Proc. AFIPS 1972 SJCC, Vol. 40, AFIPS Press, Montvale, N.J., pp HAQ, M. Insuring individuals privacy from statistical data base users. Proc. AFIPS 1975 NCC, Vol. 43, AFIPS Press, Montvale, N.J., pp HOFFMAN, L.J., AND MILLER, W.F. Getting a personal dossier from a statistical data bank. Datamation 16,5 (May 1970),
10 106 m D. Dobkin, A. K. Jones, and R. J. Lipton 8. JONES, A.K., AND LIPTON, R.J. The enforcement of security policies for computation. Proc. 5th Symp. Oper. Syst. Principles. Oper. Syst. Rev. (ACM) 9,5 (1975), JONES, A.K., AND WULF, W.A. Towards the design of secure systems. Software--Practices and Experience 5,4 (Oct. 1975), LAMPSON, B.W. Protection. Proc. 5th Princeton Symp. Inform. Sci. and Syst., 1971, pp ORGANICK, E.I. The MZJLTZCS System: An Examination of Its Structure. M.I.T. Press, Cambridge, Mass., WULF, W.A., ET AL. HYDRA: The kernel of a multiprocessor system. Comm. ACM 17, 6 (June 1974), Received March 1976; revised June 1978
Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range
THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis
Determination of the normalization level of database schemas through equivalence classes of attributes
Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,
The last three chapters introduced three major proof techniques: direct,
CHAPTER 7 Proving Non-Conditional Statements The last three chapters introduced three major proof techniques: direct, contrapositive and contradiction. These three techniques are used to prove statements
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Applied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
1 Formulating The Low Degree Testing Problem
6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,
ON THE EMBEDDING OF BIRKHOFF-WITT RINGS IN QUOTIENT FIELDS
ON THE EMBEDDING OF BIRKHOFF-WITT RINGS IN QUOTIENT FIELDS DOV TAMARI 1. Introduction and general idea. In this note a natural problem arising in connection with so-called Birkhoff-Witt algebras of Lie
Is Sometime Ever Better Than Alway?
Is Sometime Ever Better Than Alway? DAVID GRIES Cornell University The "intermittent assertion" method for proving programs correct is explained and compared with the conventional method. Simple conventional
SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by
SUBGROUPS OF CYCLIC GROUPS KEITH CONRAD 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by g = {g k : k Z}. If G = g, then G itself is cyclic, with g as a generator. Examples
Section 4.2: The Division Algorithm and Greatest Common Divisors
Section 4.2: The Division Algorithm and Greatest Common Divisors The Division Algorithm The Division Algorithm is merely long division restated as an equation. For example, the division 29 r. 20 32 948
FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z
FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization
11 Ideals. 11.1 Revisiting Z
11 Ideals The presentation here is somewhat different than the text. In particular, the sections do not match up. We have seen issues with the failure of unique factorization already, e.g., Z[ 5] = O Q(
How To Prove The Dirichlet Unit Theorem
Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if
PUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include 2 + 5.
PUTNAM TRAINING POLYNOMIALS (Last updated: November 17, 2015) Remark. This is a list of exercises on polynomials. Miguel A. Lerma Exercises 1. Find a polynomial with integral coefficients whose zeros include
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
Probability Generating Functions
page 39 Chapter 3 Probability Generating Functions 3 Preamble: Generating Functions Generating functions are widely used in mathematics, and play an important role in probability theory Consider a sequence
VERTICES OF GIVEN DEGREE IN SERIES-PARALLEL GRAPHS
VERTICES OF GIVEN DEGREE IN SERIES-PARALLEL GRAPHS MICHAEL DRMOTA, OMER GIMENEZ, AND MARC NOY Abstract. We show that the number of vertices of a given degree k in several kinds of series-parallel labelled
Large induced subgraphs with all degrees odd
Large induced subgraphs with all degrees odd A.D. Scott Department of Pure Mathematics and Mathematical Statistics, University of Cambridge, England Abstract: We prove that every connected graph of order
Stationary random graphs on Z with prescribed iid degrees and finite mean connections
Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative
An Authorization Mechanism for a Relational Database System
An Authorization Mechanism for a Relational Database System PATRICIA P. GRIFFITHS AND BRADFORD W. WADE IBM Research Laboratory A multiuser database system must selectively permit users to share data, while
1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where.
Introduction Linear Programming Neil Laws TT 00 A general optimization problem is of the form: choose x to maximise f(x) subject to x S where x = (x,..., x n ) T, f : R n R is the objective function, S
Collinear Points in Permutations
Collinear Points in Permutations Joshua N. Cooper Courant Institute of Mathematics New York University, New York, NY József Solymosi Department of Mathematics University of British Columbia, Vancouver,
Homework until Test #2
MATH31: Number Theory Homework until Test # Philipp BRAUN Section 3.1 page 43, 1. It has been conjectured that there are infinitely many primes of the form n. Exhibit five such primes. Solution. Five such
CONTRIBUTIONS TO ZERO SUM PROBLEMS
CONTRIBUTIONS TO ZERO SUM PROBLEMS S. D. ADHIKARI, Y. G. CHEN, J. B. FRIEDLANDER, S. V. KONYAGIN AND F. PAPPALARDI Abstract. A prototype of zero sum theorems, the well known theorem of Erdős, Ginzburg
RINGS WITH A POLYNOMIAL IDENTITY
RINGS WITH A POLYNOMIAL IDENTITY IRVING KAPLANSKY 1. Introduction. In connection with his investigation of projective planes, M. Hall [2, Theorem 6.2]* proved the following theorem: a division ring D in
arxiv:math/0202219v1 [math.co] 21 Feb 2002
RESTRICTED PERMUTATIONS BY PATTERNS OF TYPE (2, 1) arxiv:math/0202219v1 [math.co] 21 Feb 2002 TOUFIK MANSOUR LaBRI (UMR 5800), Université Bordeaux 1, 351 cours de la Libération, 33405 Talence Cedex, France
it is easy to see that α = a
21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UF. Therefore
arxiv:1112.0829v1 [math.pr] 5 Dec 2011
How Not to Win a Million Dollars: A Counterexample to a Conjecture of L. Breiman Thomas P. Hayes arxiv:1112.0829v1 [math.pr] 5 Dec 2011 Abstract Consider a gambling game in which we are allowed to repeatedly
Detecting Data Leakage using Data Allocation Strategies. With Fake objects
Detecting Data Leakage using Data Allocation Strategies With Fake objects S.P.Subalakshmi 1, B.Geetha 2, S.P.Karthikeyan 3 Student M.E(CSE),Mailam Engineering College,Mailam,India 1 Assistant Professor,
A New Interpretation of Information Rate
A New Interpretation of Information Rate reproduced with permission of AT&T By J. L. Kelly, jr. (Manuscript received March 2, 956) If the input symbols to a communication channel represent the outcomes
OPTIMAL SELECTION BASED ON RELATIVE RANK* (the "Secretary Problem")
OPTIMAL SELECTION BASED ON RELATIVE RANK* (the "Secretary Problem") BY Y. S. CHOW, S. MORIGUTI, H. ROBBINS AND S. M. SAMUELS ABSTRACT n rankable persons appear sequentially in random order. At the ith
Neighborhood Data and Database Security
Neighborhood Data and Database Security Kioumars Yazdanian, FrkdCric Cuppens e-mail: yaz@ tls-cs.cert.fr - cuppens@ tls-cs.cert.fr CERT / ONERA, Dept. of Computer Science 2 avenue E. Belin, B.P. 4025,31055
Universal hashing. In other words, the probability of a collision for two different keys x and y given a hash function randomly chosen from H is 1/m.
Universal hashing No matter how we choose our hash function, it is always possible to devise a set of keys that will hash to the same slot, making the hash scheme perform poorly. To circumvent this, we
* Research supported in part by KBN Grant No. PBZ KBN 016/P03/1999.
PROBABILrn AND MATHEMATICAL STATISTICS Vol. 24, Fsgc 1 (2W4), pp 1-15 ON ANNUITIES UNDER RANDOM RATES OF INTEREST' WITH PAYMENTS VARYING IN ARITHMETIC AND GEOMETRIC PROGRESSION BY K. BURNECKI*, A. MARCINIUB
i/io as compared to 4/10 for players 2 and 3. A "correct" way to play Certainly many interesting games are not solvable by this definition.
496 MATHEMATICS: D. GALE PROC. N. A. S. A THEORY OF N-PERSON GAMES WITH PERFECT INFORMA TION* By DAVID GALE BROWN UNIVBRSITY Communicated by J. von Neumann, April 17, 1953 1. Introduction.-The theory of
SOLUTIONS FOR PROBLEM SET 2
SOLUTIONS FOR PROBLEM SET 2 A: There exist primes p such that p+6k is also prime for k = 1,2 and 3. One such prime is p = 11. Another such prime is p = 41. Prove that there exists exactly one prime p such
Lecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
Finding and counting given length cycles
Finding and counting given length cycles Noga Alon Raphael Yuster Uri Zwick Abstract We present an assortment of methods for finding and counting simple cycles of a given length in directed and undirected
1 VECTOR SPACES AND SUBSPACES
1 VECTOR SPACES AND SUBSPACES What is a vector? Many are familiar with the concept of a vector as: Something which has magnitude and direction. an ordered pair or triple. a description for quantities such
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS
COUNTING INDEPENDENT SETS IN SOME CLASSES OF (ALMOST) REGULAR GRAPHS Alexander Burstein Department of Mathematics Howard University Washington, DC 259, USA [email protected] Sergey Kitaev Mathematics
MATH10040 Chapter 2: Prime and relatively prime numbers
MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive
On the Criteria To Be Used in Decomposing Systems into Modules
Programming Techniques R. Morris Editor On the Criteria To Be Used in Decomposing Systems into Modules D.L. Parnas Carnegie-Mellon University This paper discusses modularization as a mechanism for improving
A simple criterion on degree sequences of graphs
Discrete Applied Mathematics 156 (2008) 3513 3517 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Note A simple criterion on degree
Chapter 13: Basic ring theory
Chapter 3: Basic ring theory Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 42, Spring 24 M. Macauley (Clemson) Chapter 3: Basic ring
Permanents, Order Statistics, Outliers, and Robustness
Permanents, Order Statistics, Outliers, and Robustness N. BALAKRISHNAN Department of Mathematics and Statistics McMaster University Hamilton, Ontario, Canada L8S 4K [email protected] Received: November
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
On Quantum Hamming Bound
On Quantum Hamming Bound Salah A. Aly Department of Computer Science, Texas A&M University, College Station, TX 77843-3112, USA Email: [email protected] We prove quantum Hamming bound for stabilizer codes
How To Know If A Domain Is Unique In An Octempo (Euclidean) Or Not (Ecl)
Subsets of Euclidean domains possessing a unique division algorithm Andrew D. Lewis 2009/03/16 Abstract Subsets of a Euclidean domain are characterised with the following objectives: (1) ensuring uniqueness
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC
AN ALGORITHM FOR DETERMINING WHETHER A GIVEN BINARY MATROID IS GRAPHIC W. T. TUTTE. Introduction. In a recent series of papers [l-4] on graphs and matroids I used definitions equivalent to the following.
THREE DIMENSIONAL GEOMETRY
Chapter 8 THREE DIMENSIONAL GEOMETRY 8.1 Introduction In this chapter we present a vector algebra approach to three dimensional geometry. The aim is to present standard properties of lines and planes,
Theorem (informal statement): There are no extendible methods in David Chalmers s sense unless P = NP.
Theorem (informal statement): There are no extendible methods in David Chalmers s sense unless P = NP. Explication: In his paper, The Singularity: A philosophical analysis, David Chalmers defines an extendible
THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0
THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 RICHARD J. MATHAR Abstract. We count solutions to the Ramanujan-Nagell equation 2 y +n = x 2 for fixed positive n. The computational
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
Odd induced subgraphs in graphs of maximum degree three
Odd induced subgraphs in graphs of maximum degree three David M. Berman, Hong Wang, and Larry Wargo Department of Mathematics University of New Orleans New Orleans, Louisiana, USA 70148 Abstract A long-standing
CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e.
CHAPTER II THE LIMIT OF A SEQUENCE OF NUMBERS DEFINITION OF THE NUMBER e. This chapter contains the beginnings of the most important, and probably the most subtle, notion in mathematical analysis, i.e.,
Fairness in Routing and Load Balancing
Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria
A characterization of trace zero symmetric nonnegative 5x5 matrices
A characterization of trace zero symmetric nonnegative 5x5 matrices Oren Spector June 1, 009 Abstract The problem of determining necessary and sufficient conditions for a set of real numbers to be the
Definition 11.1. Given a graph G on n vertices, we define the following quantities:
Lecture 11 The Lovász ϑ Function 11.1 Perfect graphs We begin with some background on perfect graphs. graphs. First, we define some quantities on Definition 11.1. Given a graph G on n vertices, we define
Analysis of Network Part-Topology in Autodesk Map 6
6 th International Conference on Applied Informatics Eger, Hungary, January 27 31, 2004. Analysis of Network Part-Topology in Autodesk Map 6 Marianna Zichar Institute of Informatics, Department of Computer
Duplicating and its Applications in Batch Scheduling
Duplicating and its Applications in Batch Scheduling Yuzhong Zhang 1 Chunsong Bai 1 Shouyang Wang 2 1 College of Operations Research and Management Sciences Qufu Normal University, Shandong 276826, China
Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints
Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints Amotz Bar-Noy Computer and Information Science Department Brooklyn College, CUNY, New York Email: [email protected]
The Student-Project Allocation Problem
The Student-Project Allocation Problem David J. Abraham, Robert W. Irving, and David F. Manlove Department of Computing Science, University of Glasgow, Glasgow G12 8QQ, UK Email: {dabraham,rwi,davidm}@dcs.gla.ac.uk.
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
A Short Proof that Compact 2-Manifolds Can Be Triangulated
Inventiones math. 5, 160--162 (1968) A Short Proof that Compact 2-Manifolds Can Be Triangulated P. H. DOYLE and D. A. MORAN* (East Lansing, Michigan) The result mentioned in the title of this paper was
Introduction to Finite Fields (cont.)
Chapter 6 Introduction to Finite Fields (cont.) 6.1 Recall Theorem. Z m is a field m is a prime number. Theorem (Subfield Isomorphic to Z p ). Every finite field has the order of a power of a prime number
Computing divisors and common multiples of quasi-linear ordinary differential equations
Computing divisors and common multiples of quasi-linear ordinary differential equations Dima Grigoriev CNRS, Mathématiques, Université de Lille Villeneuve d Ascq, 59655, France [email protected]
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
RN-coding of Numbers: New Insights and Some Applications
RN-coding of Numbers: New Insights and Some Applications Peter Kornerup Dept. of Mathematics and Computer Science SDU, Odense, Denmark & Jean-Michel Muller LIP/Arénaire (CRNS-ENS Lyon-INRIA-UCBL) Lyon,
F. ABTAHI and M. ZARRIN. (Communicated by J. Goldstein)
Journal of Algerian Mathematical Society Vol. 1, pp. 1 6 1 CONCERNING THE l p -CONJECTURE FOR DISCRETE SEMIGROUPS F. ABTAHI and M. ZARRIN (Communicated by J. Goldstein) Abstract. For 2 < p
Lecture notes for Choice Under Uncertainty
Lecture notes for Choice Under Uncertainty 1. Introduction In this lecture we examine the theory of decision-making under uncertainty and its application to the demand for insurance. The undergraduate
An Innocent Investigation
An Innocent Investigation D. Joyce, Clark University January 2006 The beginning. Have you ever wondered why every number is either even or odd? I don t mean to ask if you ever wondered whether every number
JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004
Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February
DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS
DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We construct two computable presentations of computable torsion-free abelian groups, one of isomorphism
I. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
Determinants in the Kronecker product of matrices: The incidence matrix of a complete graph
FPSAC 2009 DMTCS proc (subm), by the authors, 1 10 Determinants in the Kronecker product of matrices: The incidence matrix of a complete graph Christopher R H Hanusa 1 and Thomas Zaslavsky 2 1 Department
The Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs The degree-diameter problem for circulant graphs of degree 8 and 9 Journal Article How to cite:
I. INTRODUCTION. of the biometric measurements is stored in the database
122 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 6, NO 1, MARCH 2011 Privacy Security Trade-Offs in Biometric Security Systems Part I: Single Use Case Lifeng Lai, Member, IEEE, Siu-Wai
Kevin James. MTHSC 412 Section 2.4 Prime Factors and Greatest Comm
MTHSC 412 Section 2.4 Prime Factors and Greatest Common Divisor Greatest Common Divisor Definition Suppose that a, b Z. Then we say that d Z is a greatest common divisor (gcd) of a and b if the following
Quotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain
Notes on real-closed fields These notes develop the algebraic background needed to understand the model theory of real-closed fields. To understand these notes, a standard graduate course in algebra is
H/wk 13, Solutions to selected problems
H/wk 13, Solutions to selected problems Ch. 4.1, Problem 5 (a) Find the number of roots of x x in Z 4, Z Z, any integral domain, Z 6. (b) Find a commutative ring in which x x has infinitely many roots.
PROOFS BY DESCENT KEITH CONRAD
PROOFS BY DESCENT KEITH CONRAD As ordinary methods, such as are found in the books, are inadequate to proving such difficult propositions, I discovered at last a most singular method... that I called the
a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
1 Introduction. Dr. T. Srinivas Department of Mathematics Kakatiya University Warangal 506009, AP, INDIA [email protected]
A New Allgoriitthm for Miiniimum Costt Liinkiing M. Sreenivas Alluri Institute of Management Sciences Hanamkonda 506001, AP, INDIA [email protected] Dr. T. Srinivas Department of Mathematics Kakatiya
Integer roots of quadratic and cubic polynomials with integer coefficients
Integer roots of quadratic and cubic polynomials with integer coefficients Konstantine Zelator Mathematics, Computer Science and Statistics 212 Ben Franklin Hall Bloomsburg University 400 East Second Street
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS David L. Spooner Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 The object-oriented programming
Portable Bushy Processing Trees for Join Queries
Reihe Informatik 11 / 1996 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard Wolfgang Scheufele Guido Moerkotte 1 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard
A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes
A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1
SYMMETRIC ENCRYPTION Mihir Bellare UCSD 1 Syntax A symmetric encryption scheme SE = (K,E,D) consists of three algorithms: K and E may be randomized, but D must be deterministic. Mihir Bellare UCSD 2 Correct
Dimensioning an inbound call center using constraint programming
Dimensioning an inbound call center using constraint programming Cyril Canon 1,2, Jean-Charles Billaut 2, and Jean-Louis Bouquard 2 1 Vitalicom, 643 avenue du grain d or, 41350 Vineuil, France [email protected]
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
