Secure databases: constraints, inference channels, and monitoring disclosures | IEEE Journals & Magazine | IEEE Xplore