Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
A security machanism for statistical database
ACM Transactions on Database Systems (TODS)
Security of statistical databases: multidimensional transformation
ACM Transactions on Database Systems (TODS)
The statistical security of a statistical database
ACM Transactions on Database Systems (TODS)
Principles of Database Systems
Principles of Database Systems
Security of Statistical Databases - Compromise through Attribute Correlational Modeling
Proceedings of the Second International Conference on Data Engineering
Statistical Databases: Characteristics, Problems, and some Solutions
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
Security of statistical databases: invasion of privacy through attribute correlational modeling (compromise, disclosure)
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
A theoretical basis for perturbation methods
Statistics and Computing
Research topics in statistical and scientific database management: the IV SSDBM
SSDBM'1988 Proceedings of the 4th international conference on Statistical and Scientific Database Management
Towards value disclosure analysis in modeling general databases
Proceedings of the 2006 ACM symposium on Applied computing
Secure and useful data sharing
Decision Support Systems
A Bayesian model for disclosure control in statistical databases
Data & Knowledge Engineering
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
An Investigation of Missing Data Methods for Classification Trees Applied to Binary Response Data
The Journal of Machine Learning Research
Hi-index | 0.00 |
A regression methodology based technique can be used to compromise confidentiality in a statistical database. This holds true even when the DBMS prevents application of regression methodology to the database. Existing inference controls, including cell restriction, perturbation, and table restriction approaches, are shown to be generally ineffective against this compromise technique. The effect of incomplete supplemental knowledge on the regression methodology based compromise technique is examined. Finally, some potential complicators of this disclosure scheme are introduced.