ACM SIGMOD Anthology TODS dblp.uni-trier.de

A Model of Statistical Databases and Their Security.

John B. Kam, Jeffrey D. Ullman: A Model of Statistical Databases and Their Security. ACM Trans. Database Syst. 2(1): 1-10(1977)
@article{DBLP:journals/tods/KamU77,
  author    = {John B. Kam and
               Jeffrey D. Ullman},
  title     = {A Model of Statistical Databases and Their Security},
  journal   = {ACM Trans. Database Syst.},
  volume    = {2},
  number    = {1},
  year      = {1977},
  pages     = {1-10},
  ee        = {http://doi.acm.org/10.1145/320521.320525, db/journals/tods/KamU77.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

Considered here, for a particular model of databases in which only information about relatively large sets of records can be obtained, is the question of whether one can from statistical information obtain information about individuals. Under the assumption that the data in the database is taken from arbitrary integers, it is shown that essentially nothing can be inferred. It is also shown that when the values are known to be imprecise in some fixed range, one can often deduce the values of individual records.

Copyright © 1977 by the ACM, Inc., used by permission. Permission to make digital or hard copies is granted provided that copies are not made or distributed for profit or direct commercial advantage, and that copies show this notice on the first page or initial screen of a display along with the full citation.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

References

[1]
...
[2]
Richard A. DeMillo, David P. Dobkin, Richard J. Lipton: Even Data Bases That Lie Can Be Compromised. IEEE Trans. Software Eng. 4(1): 73-75(1978) BibTeX
[3]
David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure Databases: Protection Against User Influence. ACM Trans. Database Syst. 4(1): 97-106(1979) BibTeX
[4]
...
[5]
...
[6]
...

Referenced by

  1. Keishi Tajima: Static Detection of Security Flaws in Object-Oriented Databases. SIGMOD Conference 1996: 341-352
  2. Mary McLeish: Further Results on the Security of Partitioned Dynamic Statistical Databases. ACM Trans. Database Syst. 14(1): 98-113(1989)
  3. Nabil R. Adam, John C. Wortmann: Security-Control Methods for Statistical Databases: A Comparative Study. ACM Comput. Surv. 21(4): 515-556(1989)
  4. Maurizio Rafanelli: Research Topics in Statistical and Scientific Database Management: the IV SSDBM. SSDBM 1988: 1-18
  5. Robert P. Trueblood, H. Rex Hartson, Johannes J. Martin: MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management. ACM Trans. Database Syst. 8(3): 382-409(1983)
  6. Zbigniew Michalewicz: Statistical Databases: Their Model, Query Language and Security. SSDBM 1983: 391-402
  7. Mary McLeish: An Information Theoretic Approach to Statistical Databases and Their Security: A Preliminary Report. SSDBM 1983: 355-359
  8. Dorothy E. Denning: A Security Model for the Statistical Database Problem. SSDBM 1983: 368-390
  9. Arie Shoshani: Statistical Databases: Characteristics, Problems, and some Solutions. VLDB 1982: 208-222
  10. Ernst L. Leiss: Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise. VLDB 1982: 189-196
  11. Jan Schlörer: Security of Statistical Databases: Multidimensional Transformation. ACM Trans. Database Syst. 6(1): 95-112(1981)
  12. George I. Davida, David L. Wells, John B. Kam: A Database Encryption System with Subkeys. ACM Trans. Database Syst. 6(2): 312-328(1981)
  13. Francis Y. L. Chin, Gultekin Özsoyoglu: Statistical Database Design. ACM Trans. Database Syst. 6(1): 113-139(1981)
  14. Jan Schlörer: Disclosure from Statistical Databases: Quantitative Aspects of Trackers. ACM Trans. Database Syst. 5(4): 467-492(1980)
  15. Dorothy E. Denning, Jan Schlörer: A Fast Procedure for Finding a Tracker in a Statistical Database. ACM Trans. Database Syst. 5(1): 88-102(1980)
  16. Dorothy E. Denning: Secure Statistical Databases with Random Sample Queries. ACM Trans. Database Syst. 5(3): 291-315(1980)
  17. Leland L. Beck: A Security Mechanism for Statistical Databases. ACM Trans. Database Syst. 5(3): 316-338(1980)
  18. Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning: Linear Queries in Statistical Databases. ACM Trans. Database Syst. 4(2): 156-167(1979)
  19. Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz: The Tracker: A Threat to Statistical Database Security. ACM Trans. Database Syst. 4(1): 76-96(1979)
  20. Francis Y. L. Chin: Security in Statistical Databases for Queries with Small Counts. ACM Trans. Database Syst. 3(1): 92-104(1978)
  21. Rainer Hüber, Peter C. Lockemann: Information Protection by Method Base Systems. VLDB 1978: 420-426
  22. David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick: Privacy and Security of Data Communications and Data Bases. VLDB 1978: 55-67
  23. François Bancilhon, Nicolas Spyratos: Protection of Information in Relational Data Bases. VLDB 1977: 494-500
  24. Clement T. Yu, Francis Y. L. Chin: A Study on the Protection of Statistical Data Bases. SIGMOD Conference 1977: 169-181
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:36 2008