Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise.
Ernst L. Leiss:
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise.
VLDB 1982: 189-196@inproceedings{DBLP:conf/vldb/Leiss82,
author = {Ernst L. Leiss},
title = {Randomizing, A Practical Method for Protecting Statistical Databases
Against Compromise},
booktitle = {Eigth International Conference on Very Large Data Bases, September
8-10, 1982, Mexico City, Mexico, Proceedings},
publisher = {Morgan Kaufmann},
year = {1982},
isbn = {0-934613-14-1},
pages = {189-196},
ee = {db/conf/vldb/Leiss82.html},
crossref = {DBLP:conf/vldb/82},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Abstract
This paper reports on a method for protecting statistical databases against inference, developed over the past four years. The method, called randomizing, is conceptually elegant, easy to implement at very small additional cost, and requires no on-going maintenance. It can be equally applied to small and medium-size as well as large databases, because it does not depend on sampling techniques in the conventional sense. Thus we feel that randomizing is an eminently practical and effective method if the protection of statistical data against inference is of concern.
Copyright © 1982 by the VLDB Endowment.
Permission to copy without fee all or part of this material is granted provided that the copies are not made or
distributed for direct commercial advantage, the VLDB
copyright notice and the title of the publication and
its date appear, and notice is given that copying
is by the permission of the Very Large Data Base
Endowment. To copy otherwise, or to republish, requires
a fee and/or special permission from the Endowment.
Online Paper
CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...
Printed Edition
Eigth International Conference on Very Large Data Bases, September 8-10, 1982, Mexico City, Mexico, Proceedings.
Morgan Kaufmann 1982, ISBN 0-934613-14-1
Contents
References
- [1]
- ...
- [2]
- George I. Davida, David J. Linton, C. Russel Szelag, David L. Wells:
Database Security.
IEEE Trans. Software Eng. 4(6): 531-533(1978)
- [3]
- Richard A. DeMillo, David P. Dobkin, Richard J. Lipton:
Even Data Bases That Lie Can Be Compromised.
IEEE Trans. Software Eng. 4(1): 73-75(1978)
- [4]
- ...
- [5]
- ...
- [6]
- Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz:
The Tracker: A Threat to Statistical Database Security.
ACM Trans. Database Syst. 4(1): 76-96(1979)
- [7]
- Dorothy E. Denning, Jan Schlörer:
A Fast Procedure for Finding a Tracker in a Statistical Database.
ACM Trans. Database Syst. 5(1): 88-102(1980)
- [8]
- David P. Dobkin, Anita K. Jones, Richard J. Lipton:
Secure Databases: Protection Against User Influence.
ACM Trans. Database Syst. 4(1): 97-106(1979)
- [9]
- ...
- [10]
- John B. Kam, Jeffrey D. Ullman:
A Model of Statistical Databases and Their Security.
ACM Trans. Database Syst. 2(1): 1-10(1977)
- [11]
- ...
- [12]
- ...
- [13]
- ...
- [14]
- ...
- [15]
- ...
- [16]
- Steven P. Reiss:
Security in Databases: A Combinatorial Study.
J. ACM 26(1): 45-57(1979)
- [17]
- ...
- [18]
- ...
- [19]
- ...
- [20]
- ...
- [21]
- Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning:
Linear Queries in Statistical Databases.
ACM Trans. Database Syst. 4(2): 156-167(1979)
- [22]
- Andrew Chi-Chih Yao:
A Note on a Conjecture of Kam and Ullman Concerning Statistical Databases.
Inf. Process. Lett. 9(1): 48-50(1979)
- [23]
- ...
- [24]
- ...
Copyright © Tue Mar 16 02:21:57 2010
by Michael Ley (ley@uni-trier.de)