ACM SIGMOD Anthology TODS dblp.uni-trier.de

The Use of Regression Methodology for the Compromise of Confidential Information in Statistical Databases.

Michael A. Palley, Jeffrey S. Simonoff: The Use of Regression Methodology for the Compromise of Confidential Information in Statistical Databases. ACM Trans. Database Syst. 12(4): 593-608(1987)
@article{DBLP:journals/tods/PalleyS87,
  author    = {Michael A. Palley and
               Jeffrey S. Simonoff},
  title     = {The Use of Regression Methodology for the Compromise of Confidential
               Information in Statistical Databases},
  journal   = {ACM Trans. Database Syst.},
  volume    = {12},
  number    = {4},
  year      = {1987},
  pages     = {593-608},
  ee        = {http://doi.acm.org/10.1145/32204.42174, db/journals/tods/PalleyS87.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

A regression methodology based technique can be used to compromise confidentiality in a statistical database. This holds true even when the DBMS prevents application of regression methodology to the database. Existing inference controls, including cell restriction, perturbation, and table restriction approaches, are shown to be generally ineffective against this compromise technique. The effect of incomplete supplemental knowledge on the regression methodology based compromise technique is examined. Finally, some potential complicators of this disclosure scheme are introduced.

Copyright © 1987 by the ACM, Inc., used by permission. Permission to make digital or hard copies is granted provided that copies are not made or distributed for profit or direct commercial advantage, and that copies show this notice on the first page or initial screen of a display along with the full citation.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

References

[1]
...
[2]
...
[3]
...
[4]
Leland L. Beck: A Security Mechanism for Statistical Databases. ACM Trans. Database Syst. 5(3): 316-338(1980) BibTeX
[5]
...
[6]
...
[7]
Francis Y. L. Chin, Gultekin Özsoyoglu: Auditing and Inference Control in Statistical Databases. IEEE Trans. Software Eng. 8(6): 574-582(1982) BibTeX
[8]
...
[9]
...
[10]
...
[11]
...
[12]
...
[13]
Dorothy E. Denning, Jan Schlörer: Inference Controls for Statistical Databases. IEEE Computer 16(7): 69-82(1983) BibTeX
[14]
...
[15]
...
[16]
...
[17]
...
[18]
...
[19]
...
[20]
Michael A. Palley: Security of Statistical Databases - Compromise through Attribute Correlational Modeling. ICDE 1986: 67-74 BibTeX
[21]
Jan Schlörer: Disclosure from Statistical Databases: Quantitative Aspects of Trackers. ACM Trans. Database Syst. 5(4): 467-492(1980) BibTeX
[22]
Arie Shoshani: Statistical Databases: Characteristics, Problems, and some Solutions. VLDB 1982: 208-222 BibTeX
[23]
...
[24]
Joseph F. Traub, Yechiam Yemini, Henryk Wozniakowski: The Statistical Security of a Statistical Database. ACM Trans. Database Syst. 9(4): 672-679(1984) BibTeX
[25]
Jeffrey D. Ullman: Principles of Database Systems, 2nd Edition. Computer Science Press 1982, ISBN 0-914894-36-6
BibTeX
[26]
Dorothy E. Denning: Secure Statistical Databases with Random Sample Queries. ACM Trans. Database Syst. 5(3): 291-315(1980) BibTeX

Referenced by

  1. Nabil R. Adam, John C. Wortmann: Security-Control Methods for Statistical Databases: A Comparative Study. ACM Comput. Surv. 21(4): 515-556(1989)
  2. Maurizio Rafanelli: Research Topics in Statistical and Scientific Database Management: the IV SSDBM. SSDBM 1988: 1-18
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:39:03 2008