A lattice model of secure information flow
Communications of the ACM
A relational model of data for large shared data banks
Communications of the ACM
HYDRA: the kernel of a multiprocessor operating system
Communications of the ACM
The enforcement of security policies for computation
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The multics system: an examination of its structure
The multics system: an examination of its structure
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Practical data-swapping: the first steps
ACM Transactions on Database Systems (TODS)
A data distortion by probability distribution
ACM Transactions on Database Systems (TODS)
Resolving the tension between integrity and security using a theorem prover
SIGMOD '88 Proceedings of the 1988 ACM SIGMOD international conference on Management of data
Further results on the security of partitioned dynamic statistical databases
ACM Transactions on Database Systems (TODS)
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Static detection of security flaws in object-oriented databases
SIGMOD '96 Proceedings of the 1996 ACM SIGMOD international conference on Management of data
Journal of the ACM (JACM)
ACM Transactions on Database Systems (TODS)
Compromising statistical databases responding to queries about means
ACM Transactions on Database Systems (TODS)
MULTISAFE—a modular multiprocessing approach to secure database management
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Linear queries in statistical databases
ACM Transactions on Database Systems (TODS)
A fast procedure for finding a tracker in a statistical database
ACM Transactions on Database Systems (TODS)
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
A security machanism for statistical database
ACM Transactions on Database Systems (TODS)
Security of statistical databases: multidimensional transformation
ACM Transactions on Database Systems (TODS)
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
ACM Computing Surveys (CSUR)
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
The statistical security of a statistical database
ACM Transactions on Database Systems (TODS)
A dynamic logic of multiprocessing with incomplete information
POPL '80 Proceedings of the 7th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Database Interrogation Using Conjunctive Queries
ICDT '03 Proceedings of the 9th International Conference on Database Theory
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
Statistical Databases: Characteristics, Problems, and some Solutions
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
Auditing Interval-Based Inference
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Cardinality-Based Inference Control in Sum-Only Data Cubes
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
ICSE '81 Proceedings of the 5th international conference on Software engineering
Journal of Computer and System Sciences - Special issue on PODS 2000
Privacy conflicts in CRM services for online shops: a case study
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Privacy-preserving data integration and sharing
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Security in sensor networks: watermarking techniques
Wireless sensor networks
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Cardinality-based inference control in data cubes
Journal of Computer Security
Query directed partitioning scheme for securing statistical databases
SSDBM'81 Proceedings of the 1st LBL Workshop on Statistical database management
A security model for the statistical database problem
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
Statistical databases: their model, query language and security
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
On tracker attacks in health grids
Proceedings of the 2006 ACM symposium on Applied computing
Privacy via pseudorandom sketches
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
A secure distributed framework for achieving k-anonymity
The VLDB Journal — The International Journal on Very Large Data Bases
Towards robustness in query auditing
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Protection of information in relational data bases
VLDB '77 Proceedings of the third international conference on Very large data bases - Volume 3
Information protection by method base systems
VLDB '78 Proceedings of the fourth international conference on Very Large Data Bases - Volume 4
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Information disclosure under realistic assumptions: privacy versus optimality
Proceedings of the 14th ACM conference on Computer and communications security
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Parity-based inference control for multi-dimensional range sum queries
Journal of Computer Security
Computational complexity of auditing finite attributes in statistical databases
Journal of Computer and System Sciences
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Simulatable Binding: Beyond Simulatable Auditing
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
A Robust Sampling-Based Framework for Privacy Preserving OLAP
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Disclosure Analysis and Control in Statistical Databases
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
Effective inference control mechanisms for securing statistical databases
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
Dynamic inference control in privacy preference enforcement
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
A Bayesian model for disclosure control in statistical databases
Data & Knowledge Engineering
Self-enforcing Private Inference Control
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Auditing user queries in dynamic statistical databases
Information Sciences: an International Journal
A cubic-wise balance approach for privacy preservation in data cubes
Information Sciences: an International Journal
Restoring compromised privacy in micro-data disclosure
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Memory organization schemes for large shared data
STACS'99 Proceedings of the 16th annual conference on Theoretical aspects of computer science
New paradigm of inference control with trusted computing
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
ACM Transactions on Database Systems (TODS)
Journal of Computer and System Sciences
Protecting data privacy through hard-to-reverse negative databases
ISC'06 Proceedings of the 9th international conference on Information Security
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Competitive privacy: secure analysis on integrated sequence data
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Applied quantitative information flow and statistical databases
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Privacy-preserving distributed k-anonymity
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Temporal context lie detection and generation
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Unauthorized inferences in semistructured databases
Information Sciences: an International Journal
Secure query processing against encrypted XML data using Query-Aware Decryption
Information Sciences: an International Journal
Auditing and inference control for privacy preservation in uncertain environments
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Disclosure analysis for two-way contingency tables
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Denials leak information: Simulatable auditing
Journal of Computer and System Sciences
An event-based platform for collaborative threats detection and monitoring
Information Systems
Hi-index | 0.00 |
Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.