ACM SIGMOD Anthology ACM SIGMOD dblp.uni-trier.de

A Security Model for the Statistical Database Problem.

Dorothy E. Denning: A Security Model for the Statistical Database Problem. SSDBM 1983: 368-390
@inproceedings{DBLP:conf/ssdbm/Denning83,
  author    = {Dorothy E. Denning},
  editor    = {Roy Hammond and
               John L. McCarthy},
  title     = {A Security Model for the Statistical Database Problem},
  booktitle = {Proceedings of the Second International Workshop on Statistical
               Database Management, Los Altos, California, USA, September 27-29,
               1983},
  publisher = {Lawrence Berkeley Laboratory},
  year      = {1983},
  pages     = {368-390},
  ee        = {db/conf/ssdbm/Denning83.html},
  crossref  = {DBLP:conf/ssdbm/83},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

A security model for addressing the statistical inference problem in online query processing systems is described. The set of all statistics computed over groups of records having common characteristics arc structured as a lattice of logical tables. The lattice model provides a mathematical basis for studying the inference problem, and a framework for evaluating and comparing different controls. Although the lattice model has been used by census agencies to protect statistical tables published online, it has only recently been used to develop inference controls for general purpose query processing systems.

ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 2 Issue 5, SSDBM, DBPL, KRDB, ADBIS, COOPIS, SIGBDP" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

Printed Edition

Roy Hammond, John L. McCarthy (Eds.): Proceedings of the Second International Workshop on Statistical Database Management, Los Altos, California, USA, September 27-29, 1983. Lawrence Berkeley Laboratory 1983
Contents BibTeX

References

[1]
...
[2]
...
[3]
...
[4]
...
[5]
...
[6]
...
[7]
...
[8]
...
[9]
...
[10]
...
[11]
John B. Kam, Jeffrey D. Ullman: A Model of Statistical Databases and Their Security. ACM Trans. Database Syst. 2(1): 1-10(1977) BibTeX
[12]
...
[13]
Neil C. Rowe: Rule/based Statistical Calculations on a "Database Abstract". SSDBM 1981: 163-175 BibTeX
[14]
...
[15]
...
[16]
Jan Schlörer: Disclosure from Statistical Databases: Quantitative Aspects of Trackers. ACM Trans. Database Syst. 5(4): 467-492(1980) BibTeX
[17]
...
[18]
Dorothy E. Denning: Cryptography and Data Security. Addison-Wesley 1982
BibTeX
[19]
...
[20]
Jan Schlörer: Security of Statistical Databases: Multidimensional Transformation. ACM Trans. Database Syst. 6(1): 95-112(1981) BibTeX
[21]
...
[22]
...
[23]
David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure Databases: Protection Against User Influence. ACM Trans. Database Syst. 4(1): 97-106(1979) BibTeX
[24]
Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz: The Tracker: A Threat to Statistical Database Security. ACM Trans. Database Syst. 4(1): 76-96(1979) BibTeX
[25]
Dorothy E. Denning, Jan Schlörer: A Fast Procedure for Finding a Tracker in a Statistical Database. ACM Trans. Database Syst. 5(1): 88-102(1980) BibTeX
[26]
...
[27]
...
[28]
Dorothy E. Denning, Jan Schlörer: Inference Controls for Statistical Databases. IEEE Computer 16(7): 69-82(1983) BibTeX
[29]
...
[30]
...
[31]
Leland L. Beck: A Security Mechanism for Statistical Databases. ACM Trans. Database Syst. 5(3): 316-338(1980) BibTeX
[32]
Steven P. Reiss, Mark J. Post, Tore Dalenius: Non-reversible Privacy Transformations. PODS 1982: 139-146 BibTeX
[33]
...
[34]
Dorothy E. Denning: Secure Statistical Databases with Random Sample Queries. ACM Trans. Database Syst. 5(3): 291-315(1980) BibTeX
[35]
Dorothy E. Denning: The Many-Time Pad: Theme and Variations. IEEE Symposium on Security and Privacy 1983: 23-32 BibTeX
[36]
...
[37]
...
[38]
...
[39]
...
[40]
...
[41]
...
[42]
...
[43]
Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning: Linear Queries in Statistical Databases. ACM Trans. Database Syst. 4(2): 156-167(1979) BibTeX
[44]
Richard A. DeMillo, David P. Dobkin, Richard J. Lipton: Even Data Bases That Lie Can Be Compromised. IEEE Trans. Software Eng. 4(1): 73-75(1978) BibTeX
[45]
...
[46]
...
[47]
E. F. Codd: A Relational Model of Data for Large Shared Data Banks. Commun. ACM 13(6): 377-387(1970) BibTeX
[48]
Jeffrey D. Ullman: Principles of Database Systems, 1st Edition. Computer Science Press 1980
BibTeX
[49]
Arie Shoshani: Statistical Databases: Characteristics, Problems, and some Solutions. VLDB 1982: 208-222 BibTeX
[50]
Paul Chan, Arie Shoshani: SUBJECT: A Directory Driven System for Organizing and Accessing Large Statistical Databases. VLDB 1981: 553-563 BibTeX
[51]
...
[52]
...

Referenced by

  1. Nabil R. Adam, John C. Wortmann: Security-Control Methods for Statistical Databases: A Comparative Study. ACM Comput. Surv. 21(4): 515-556(1989)
  2. John C. Klensin, Roselyn M. Romberg: Statistical Data Management Requirements and the SQL Standards - An Evolving Comparison. SSDBM 1988: 19-38
  3. Gultekin Özsoyoglu, JiYoung Chung: Information Loss in the Lattice Model of Summary Tables due to Cell Suppression. ICDE 1986: 75-83
  4. Frank Olken: How Baroque Should a Statistical Database Management System Be? SSDBM 1983: 212-219
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
SSDBM 1983 Proceedings: Copyright © by Lawrence Berkeley National Laboratory, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:42:39 2009