Download now Free registration required
The author addresses the problems of proving ownership and unauthorized data distribution (leakage) for relational databases. The author use business process outsourcing scenarios as the descriptive use case, but the techniques are equally applicable in other use cases when a relational database is shared among many parties and its confidentiality and authenticity needs to be protected. Previous work has shown how to watermark and fingerprint numerical relational data to prove ownership and track unauthorized redistributions respectively. This work represents the first attempt to find more general solutions that can practically accommodate relational data with non-numerical or error sensitive attributes that are common in corporate databases.
- Format: PDF
- Size: 255.7 KB