Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Linear queries in statistical databases
ACM Transactions on Database Systems (TODS)
A fast procedure for finding a tracker in a statistical database
ACM Transactions on Database Systems (TODS)
Security in statistical databases for queries with small counts
ACM Transactions on Database Systems (TODS)
A model of statistical database their security
ACM Transactions on Database Systems (TODS)
A security machanism for statistical database
ACM Transactions on Database Systems (TODS)
ACM Computing Surveys (CSUR)
A study on the protection of statistical data bases
SIGMOD '77 Proceedings of the 1977 ACM SIGMOD international conference on Management of data
Inference from statistical data bases.
Inference from statistical data bases.
A data distortion by probability distribution
ACM Transactions on Database Systems (TODS)
Security problems on inference control for SUM, MAX, and MIN queries
Journal of the ACM (JACM)
ACM Transactions on Database Systems (TODS)
Further results on the security of partitioned dynamic statistical databases
ACM Transactions on Database Systems (TODS)
Protecting statistical databases: a matter of privacy
ACM SIGCAS Computers and Society
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Random sampling from hash files
SIGMOD '90 Proceedings of the 1990 ACM SIGMOD international conference on Management of data
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Non-reversible privacy transformations
PODS '82 Proceedings of the 1st ACM SIGACT-SIGMOD symposium on Principles of database systems
Performance evaluation of the statistical aggregation by categorization in the SM3 system
SIGMOD '84 Proceedings of the 1984 ACM SIGMOD international conference on Management of data
Statistical Relational Databases: Normal Forms
IEEE Transactions on Knowledge and Data Engineering
Statistical Databases: Characteristics, Problems, and some Solutions
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
An Analytic Approach to Statistical Databases
VLDB '83 Proceedings of the 9th International Conference on Very Large Data Bases
A Decathlon in Multidimensional Modeling: Open Issues and Some Solutions
DaWaK 2000 Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery
Auditing Interval-Based Inference
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Cardinality-Based Inference Control in Sum-Only Data Cubes
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Auditing for secure statistical databases
ACM '81 Proceedings of the ACM '81 conference
Multidimensional databases
Privacy-preserving data integration and sharing
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Privacy: A Machine Learning View
IEEE Transactions on Knowledge and Data Engineering
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Practical privacy: the SuLQ framework
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Cardinality-based inference control in data cubes
Journal of Computer Security
General purpose database summarization
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Efficient inference control for range SUM queries on statistical data bases
SSDBM'81 Proceedings of the 1st LBL Workshop on Statistical database management
Query directed partitioning scheme for securing statistical databases
SSDBM'81 Proceedings of the 1st LBL Workshop on Statistical database management
A security model for the statistical database problem
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
Statistical databases: their model, query language and security
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
Random sampling from database files: a survey
SSDBM'1990 Proceedings of the 5th international conference on Statistical and Scientific Database Management
Research topics in statistical and scientific database management: the IV SSDBM
SSDBM'1988 Proceedings of the 4th international conference on Statistical and Scientific Database Management
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Denormalization strategies for data retrieval from data warehouses
Decision Support Systems
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Time series compressibility and privacy
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Output perturbation with query relaxation
Proceedings of the VLDB Endowment
Effective inference control mechanisms for securing statistical databases
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
Dynamic inference control in privacy preference enforcement
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A Bayesian model for disclosure control in statistical databases
Data & Knowledge Engineering
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
An overview of computer security
IBM Systems Journal
Auditing user queries in dynamic statistical databases
Information Sciences: an International Journal
A cubic-wise balance approach for privacy preservation in data cubes
Information Sciences: an International Journal
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
New paradigm of inference control with trusted computing
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
A firm foundation for private data analysis
Communications of the ACM
Software—Practice & Experience - Focus on Selected PhD Literature Reviews in the Practical Aspects of Software Technology
ACM Transactions on Database Systems (TODS)
Ask a better question, get a better answer a new approach to private data analysis
ICDT'07 Proceedings of the 11th international conference on Database Theory
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
FMC: an approach for privacy preserving OLAP
DaWaK'05 Proceedings of the 7th international conference on Data Warehousing and Knowledge Discovery
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Temporal context lie detection and generation
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Auditing and inference control for privacy preservation in uncertain environments
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Calibrating noise to sensitivity in private data analysis
TCC'06 Proceedings of the Third conference on Theory of Cryptography
A novel framework for preserving privacy of data using correlation analysis
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Security of random output perturbation for statistical databases
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Hi-index | 0.03 |
A new inference control, called random sample queries, is proposed for safeguarding confidential data in on-line statistical databases. The random sample queries control deals directly with the basic principle of compromise by making it impossible for a questioner to control precisely the formation of query sets. Queries for relative frequencies and averages are computed using random samples drawn from the query sets. The sampling strategy permits the release of accurate and timely statistics and can be implemented at very low cost. Analysis shows the relative error in the statistics decreases as the query set size increases; in contrast, the effort required to compromise increases with the query set size due to large absolute errors. Experiments performed on a simulated database support the analysis.