Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Extending the database relational model to capture more meaning
ACM Transactions on Database Systems (TODS)
Security in statistical databases for queries with small counts
ACM Transactions on Database Systems (TODS)
The entity-relationship model—toward a unified view of data
ACM Transactions on Database Systems (TODS) - Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
A model of statistical database their security
ACM Transactions on Database Systems (TODS)
Database abstractions: aggregation and generalization
ACM Transactions on Database Systems (TODS)
Security in Databases: A Combinatorial Study
Journal of the ACM (JACM)
Database abstractions: aggregation
Communications of the ACM
A relational model of data for large shared data banks
Communications of the ACM
A study on the protection of statistical data bases
SIGMOD '77 Proceedings of the 1977 ACM SIGMOD international conference on Management of data
The Design and Analysis of Computer Algorithms
The Design and Analysis of Computer Algorithms
Systems for Large Data Bases
AFIPS '71 (Fall) Proceedings of the November 16-18, 1971, fall joint computer conference
Security problems on inference control for SUM, MAX, and MIN queries
Journal of the ACM (JACM)
Further results on the security of partitioned dynamic statistical databases
ACM Transactions on Database Systems (TODS)
Protecting statistical databases: a matter of privacy
ACM SIGCAS Computers and Society
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
A universal-scheme approach to statistical databases containing homogeneous summary tables
ACM Transactions on Database Systems (TODS)
Privacy considerations as we enter the “information highway” era
ACM SIGCAS Computers and Society
A deterrent to linear system inferential attacks using a mediator
SAC '94 Proceedings of the 1994 ACM symposium on Applied computing
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
An Analytic Approach to Statistical Databases
VLDB '83 Proceedings of the 9th International Conference on Very Large Data Bases
Auditing Interval-Based Inference
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
A Privacy-Enhanced Microaggregation Method
FoIKS '02 Proceedings of the Second International Symposium on Foundations of Information and Knowledge Systems
Cardinality-Based Inference Control in Sum-Only Data Cubes
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Auditing for secure statistical databases
ACM '81 Proceedings of the ACM '81 conference
Journal of Computer and System Sciences - Special issue on PODS 2000
Remote access systems for statistical analysis of microdata
Statistics and Computing
Cardinality-based inference control in data cubes
Journal of Computer Security
For large meta information of national integrated statistics
SSDBM'81 Proceedings of the 1st LBL Workshop on Statistical database management
Efficient inference control for range SUM queries on statistical data bases
SSDBM'81 Proceedings of the 1st LBL Workshop on Statistical database management
Update handling techniques in statistical databases
SSDBM'81 Proceedings of the 1st LBL Workshop on Statistical database management
Features of a system for statistical databases
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
Statistical databases: their model, query language and security
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
An analytical approach to the inference of summary data of additive type
Theoretical Computer Science
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Auditing user queries in dynamic statistical databases
Information Sciences: an International Journal
New paradigm of inference control with trusted computing
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
ACM Transactions on Database Systems (TODS)
Disclosure analysis for two-way contingency tables
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Denials leak information: Simulatable auditing
Journal of Computer and System Sciences
Hi-index | 0.00 |
The security problem of a statistical database is to limit the use of the database so that no sequence of statistical queries is sufficient to deduce confidential or private information. In this paper it is suggested that the problem be investigated at the conceptual data model level. The design of a statistical database should utilize a statistical security management facility to enforce the security constraints at the conceptual model level. Information revealed to users is well defined in the sense that it can at most be reduced to nondecomposable information involving a group of individuals. In addition, the design also takes into consideration means of storing the query information for auditing purposes, changes in the database, users' knowledge, and some security measures.