Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Security in statistical databases for queries with small counts
ACM Transactions on Database Systems (TODS)
A model of statistical database their security
ACM Transactions on Database Systems (TODS)
A study on the protection of statistical data bases
SIGMOD '77 Proceedings of the 1977 ACM SIGMOD international conference on Management of data
Selective partial access to a database
ACM '76 Proceedings of the 1976 annual conference
A data distortion by probability distribution
ACM Transactions on Database Systems (TODS)
Security problems on inference control for SUM, MAX, and MIN queries
Journal of the ACM (JACM)
ACM Transactions on Database Systems (TODS)
Further results on the security of partitioned dynamic statistical databases
ACM Transactions on Database Systems (TODS)
Protecting statistical databases: a matter of privacy
ACM SIGCAS Computers and Society
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Hybrid inferential security methods for statistical databases
ACM SIGAPP Applied Computing Review - Special issue on security
Static detection of security flaws in object-oriented databases
SIGMOD '96 Proceedings of the 1996 ACM SIGMOD international conference on Management of data
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
A deterrent to linear system inferential attacks using a mediator
SAC '94 Proceedings of the 1994 ACM symposium on Applied computing
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
The statistical security of a statistical database
ACM Transactions on Database Systems (TODS)
Non-reversible privacy transformations
PODS '82 Proceedings of the 1st ACM SIGACT-SIGMOD symposium on Principles of database systems
Statistical Databases: Characteristics, Problems, and some Solutions
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
An Analytic Approach to Statistical Databases
VLDB '83 Proceedings of the 9th International Conference on Very Large Data Bases
Auditing Interval-Based Inference
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Cardinality-Based Inference Control in Sum-Only Data Cubes
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Auditing for secure statistical databases
ACM '81 Proceedings of the ACM '81 conference
Journal of Computer and System Sciences - Special issue on PODS 2000
Privacy conflicts in CRM services for online shops: a case study
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Multidimensional databases
Proceedings of the 11th ACM conference on Computer and communications security
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Cardinality-based inference control in data cubes
Journal of Computer Security
Efficient inference control for range SUM queries on statistical data bases
SSDBM'81 Proceedings of the 1st LBL Workshop on Statistical database management
Update handling techniques in statistical databases
SSDBM'81 Proceedings of the 1st LBL Workshop on Statistical database management
Query directed partitioning scheme for securing statistical databases
SSDBM'81 Proceedings of the 1st LBL Workshop on Statistical database management
A security model for the statistical database problem
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
Statistical databases: their model, query language and security
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
A general model for the answer-perturbation techniques
SSDBM'1994 Proceedings of the 7th international conference on Scientific and Statistical Database Management
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
PolyLens: a recommender system for groups of users
ECSCW'01 Proceedings of the seventh conference on European Conference on Computer Supported Cooperative Work
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Parity-based inference control for multi-dimensional range sum queries
Journal of Computer Security
Computational complexity of auditing finite attributes in statistical databases
Journal of Computer and System Sciences
A Robust Sampling-Based Framework for Privacy Preserving OLAP
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Disclosure Analysis and Control in Statistical Databases
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Effective inference control mechanisms for securing statistical databases
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
Dynamic inference control in privacy preference enforcement
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
On Distributed k-Anonymization
Fundamenta Informaticae
A Bayesian model for disclosure control in statistical databases
Data & Knowledge Engineering
Proceedings of the 16th ACM conference on Computer and communications security
A cubic-wise balance approach for privacy preservation in data cubes
Information Sciences: an International Journal
New paradigm of inference control with trusted computing
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
User profiling with privacy: a framework for adaptive information agents
Intelligent information agents
Privacy disclosure analysis and control for 2D contingency tables containing inaccurate data
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Software—Practice & Experience - Focus on Selected PhD Literature Reviews in the Practical Aspects of Software Technology
Journal of Computer and System Sciences
To release or not to release: evaluating information leaks in aggregate human-genome data
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
The tradeoffs of societal computing
Proceedings of the 10th SIGPLAN symposium on New ideas, new paradigms, and reflections on programming and software
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Temporal context lie detection and generation
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Auditing and inference control for privacy preservation in uncertain environments
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Disclosure analysis for two-way contingency tables
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
On Distributed k-Anonymization
Fundamenta Informaticae
Denials leak information: Simulatable auditing
Journal of Computer and System Sciences
Hi-index | 0.00 |
The problem of user inference in statistical databases is discussed and illustrated with several examples. It is assumed that the database allows “total,” “average,” “count,” and “percentile” queries; a query may refer to any arbitrary subset of the database. Methods for protecting the security of such a database are considered; it is shown that any scheme which gives “statistically correct” answers is vulnerable to penetration. A precise definition of compromisability (in a statistical sense) is given. A general model of user inference is proposed; two special cases of this model appear to contain all previously published strategies for compromising a statistical database. A method for protecting the security of such a statistical database against these types of user inference is presented and discussed. It is shown that the number of queries required to compromise the database can be made arbitrarily large by accepting moderate increases in the variance of responses to queries. A numerical example is presented to illustrate the application of the techniques discussed.