Access the full text.
Sign up today, get DeepDyve free for 14 days.
D. Denning (1983)
A Security Model for the Statistical Database Problem
N. Matloff (1986)
Another Look at the Use of Noise Addition for Database Security1986 IEEE Symposium on Security and Privacy
G. Özsoyoglu, T. Su (1985)
Rounding and Inference Controlin Conceptual Models for Statistical Databases1985 IEEE Symposium on Security and Privacy
F. Chin (1978)
Security in statistical databases for queries with small countsACM Trans. Database Syst., 3
(1987)
Received January
G. Özsoyoglu, Z. Özsoyoglu (1981)
Update Handling Techniques in Statistical Databases
S. Reiss (1980)
Practical Data-Swapping: The First Steps1980 IEEE Symposium on Security and Privacy
F. Chin, G. Özsoyoglu (1982)
Auditing and Inference Control in Statistical DatabasesIEEE Transactions on Software Engineering, SE-8
J. Schlörer (1980)
Security of statistical databases: multidimensional transformationACM Trans. Database Syst., 6
E. Lefons, A. Silvestri, F. Tangorra (1983)
An Analytic Approach to Statistical Databases
J. Schlörer (1980)
Disclosure from Statistical Databases: Quantitative Aspects of TrackersACM Trans. Database Syst., 5
D. Denning, J. Schlörer (1980)
A fast procedure for finding a tracker in a statistical databaseACM Trans. Database Syst., 5
T. Friedman, L. Hoffman (1980)
Towards a Fail-Safe Approach to Secure Databases1980 IEEE Symposium on Security and Privacy
R. Lesuisse (1986)
Modern methods for COBOL programmers: By J.R. Pugh and D.H. Bell, Prentice-Hall, Englewood Cliffs, NJ, 1983Science of Computer Programming, 6
C. Liew, Uinam Choi, C. Liew (1985)
A data distortion by probability distributionACM Trans. Database Syst., 10
D. Denning, J. Schlörer, Elisabeth Wehrle (1982)
Memoryless Inference Controls for Statistical Databases1982 IEEE Symposium on Security and Privacy
M. Morgenstern (1987)
Security and inference in multilevel database and knowledge-base systems
Sakti Ghosh (1986)
Statistical relational tables for statistical database managementIEEE Transactions on Software Engineering, SE-12
Sakti Ghosh (1984)
An application of statistical databases in manufacturing testing1984 IEEE First International Conference on Data Engineering
L. Cox (1980)
Suppression Methodology and Statistical Disclosure ControlJournal of the American Statistical Association, 75
D. Denning, J. Schlörer (1983)
Inference Controls for Statistical DatabasesComputer, 16
J. Schlörer (1975)
Identification and Retrieval of Personal Records from a Statistical Data BankMethods of Information in Medicine, 14
DALENIUS T. (1977)
Towards a methodology for statistical disclosure controlStatistik Tidskrift, 15
Abdel-Latif Abul-Ela, Gernard Greenberg, D. Horvitz (1967)
A Multi-Proportions Randomized Response ModelJournal of the American Statistical Association, 62
G. Sande (1983)
Automated Cell Suppression to Preserve Confidentiality of Business Statistics
SCHLORER J. (1975)
Identification and retrieval of personal records from a statistical data bank. Methods InfoMed., 14
(1984)
Security issues in knowledge systems
J. Traub, Y. Yemini, H. Wozniakowski (1984)
The statistical security of a statistical databaseACM Trans. Database Syst., 9
B. Greenberg, R. Kuebler, J. Abernathy, D. Horvitz (1971)
Application of the Randomized Response Technique in Obtaining Quantitative DataJournal of the American Statistical Association, 66
M. McLeish (1983)
An Information Theoretic Approach to Statistical Databases and Their Security: A Preliminary Report
F. Chin, G. Özsoyoglu (1981)
Statistical database designACM Trans. Database Syst., 6
Francis Chin, Francis Chin, P. Kossowski, S. Loh (1984)
Efficient Inference Control for Range SUM QueriesTheor. Comput. Sci., 32
T. Su, G. Özsoyoglu (1987)
Data Dependencies and Inference Control in Multilevel Relational Database Systems1987 IEEE Symposium on Security and Privacy
G. Özsoyoglu, F. Chin (1982)
Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel DesignIEEE Transactions on Software Engineering, SE-8
M. Haq (1977)
On Safeguarding Statistical Disclosure by Giving Approximate Answers to Queries
B. Greenberg, Abdel-Latif Abul-Ela, W. Simmons, D. Horvitz (1969)
The Unrelated Question Randomized Response Model: Theoretical FrameworkJournal of the American Statistical Association, 64
D. Denning (1985)
Commutative Filters for Reducing Inference Threats in Multilevel Database Systems1985 IEEE Symposium on Security and Privacy
E. Leiss (1982)
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise
共立出版株式会社 (1978)
コンピュータ・サイエンス : ACM computing surveys
D. Denning (1980)
Secure statistical databases with random sample queriesACM Trans. Database Syst., 5
(1974)
The invasion of privacy problem and statistics production
W. Jonge (1983)
Compromising statistical databases responding to queries about meansACM Trans. Database Syst., 8
M. Schwartz, D. Denning, P. Denning (1979)
Linear queries in statistical databasesACM Transactions on Database Systems (TODS), 4
G. Özsoyoglu, JiYoung Chung (1986)
Information loss in the lattice model of summary tables due to cell suppression1986 IEEE Second International Conference on Data Engineering
N. Rowe (1984)
Diophantine inferences from statistical aggregates on few-valued attributes1984 IEEE First International Conference on Data Engineering
S. Warner (1971)
The Linear Randomized Response ModelJournal of the American Statistical Association, 66
D. Dobkin, Anita Jones, R. Lipton (1979)
Secure databases: protection against user influenceACM Trans. Database Syst., 4
J. Am. Stat. Assoc
J. Schlörer (1976)
Confidentiality of Statistical Records: A Threat-Monitoring Scheme for On Line DialogueMethods of Information in Medicine, 15
J. Schlörer (1983)
Information Loss in Partitioned Statistical DatabasesComput. J., 26
D. Denning (1984)
Cryptographic Checksums for Multilevel Database Security1984 IEEE Symposium on Security and Privacy
HOFFMAN L. J. (1970)
Getting a personal dossier from a statistical data bankDatarnation, 16
M. Palley, J. Simonoff (1987)
The use of regression methodology for the compromise of confidential information in statistical databasesACM Trans. Database Syst., 12
Clement Yu, F. Chin (1977)
A study on the protection of statistical data bases
D. Denning (1982)
Cryptography and Data Security
P. Chin, C. Ozsoyoglu (1979)
Security is partitioned dynamic stastical databases
December 1989 Security Control Method For Databases 555
James Achugbue, F. Chin (1979)
The Effectiveness Of Output Modification By Rounding For Protection Of Statistical Data BasesInfor, 17
A. Miller (1972)
The assault on privacy : computers, data banks, and dossiers
D. Denning, P. Denning, M. Schwartz (1979)
The tracker: a threat to statistical database securityACM Trans. Database Syst., 4
M. Haq (1975)
Insuring individual's privacy from statistical data base users
I. Fellegi (1972)
On the Question of Statistical ConfidentialityJournal of the American Statistical Association, 67
S. Warner (1965)
Randomized response: a survey technique for eliminating evasive answer bias.Journal of the American Statistical Association, 60 309
L. Beck (1980)
A security machanism for statistical databaseACM Trans. Database Syst., 5
(1981)
A simple procedure for controlled rounding
M. Palley (1986)
Security of statistical databases compromise through attribute correlational modeling1986 IEEE Second International Conference on Data Engineering
J. Kam, J. Ullman (1977)
A model of statistical database their securityACM Trans. Database Syst., 2
D. Denning (1981)
Restriciting Queries that Might Lead to Compromise1981 IEEE Symposium on Security and Privacy
I. Fellegi, J. Phillips (1974)
Statistical Confidentiality: Some Theory and Application to Data Dissemination
R. Turn, N. Shapiro (1972)
Privacy and security in databank systems: measures of effectiveness, costs, and protector-intruder interactions
L. Hoffman (1973)
Modern methods for computer security and privacy
DALENIUS T. (1974)
The invasion of privacy problem and statistics production. An overviewStatistik Tidskrift, 12
This paper considers the problem of providing security to statistical databases against disclosure of confidential information. Security-control methods suggested in the literature are classified into four general approaches: conceptual, query restriction, data perturbation, and output perturbation. Criteria for evaluating the performance of the various security-control methods are identified. Security-control methods that are based on each of the four approaches are discussed, together with their performance with respect to the identified evaluation criteria. A detailed comparative analysis of the most promising methods for protecting dynamic-online statistical databases is also presented. To date no single security-control method prevents both exact and partial disclosures. There are, however, a few perturbation-based methods that prevent exact disclosure and enable the database administrator to exercise "statistical disclosure control." Some of these methods, however introduce bias into query responses or suffer from the 0/1 query-set-size problem (i.e., partial disclosure is possible in case of null query set or a query set of size 1). We recommend directing future research efforts toward developing new methods that prevent exact disclosure and provide statistical-disclosure control, while at the same time do not suffer from the bias problem and the 0/1 query-set-size problem. Furthermore, efforts directed toward developing a bias-correction mechanism and solving the general problem of small query-set-size would help salvage a few of the current perturbation-based methods.
ACM Computing Surveys (CSUR) – Association for Computing Machinery
Published: Dec 1, 1989
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.