Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
A modified random perturbation method for database security
ACM Transactions on Database Systems (TODS)
Security in computing
Security of random data perturbation methods
ACM Transactions on Database Systems (TODS)
The statistical security of a statistical database
ACM Transactions on Database Systems (TODS)
Interval Protection of Confidential Information in a Database
INFORMS Journal on Computing
The Security of Confidential Numerical Data in Databases
Information Systems Research
Image Noise Removal in Nakagami Fading Channels via Bayesian Estimator
DELTA '06 Proceedings of the Third IEEE International Workshop on Electronic Design, Test and Applications
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 06
Private Markets for Public Goods: Pricing Strategies of Online Database Vendors
Journal of Management Information Systems
Hi-index | 0.00 |
there has recently been a great focus from research projects towards providing unlimited, correct, numerical responses to ad-hoc queries to an on-line database, while not compromising confidential numerical data. Unlike traditional random data perturbation (RDP), a new approach titled pseudo random binary sequences covered RDP is carefully established. It will be also demonstrated how numerical confidential data can be protected against insider threat based on data in this paper. As an application of our method, an online medical survey database is, as a case study, described, which can be easily extended to other application fields, such as e-government, e-commerce, etc.