The Use of Regression Methodology for the Compromise of Confidential Information in Statistical Databases.
Michael A. Palley, Jeffrey S. Simonoff:
The Use of Regression Methodology for the Compromise of Confidential Information in Statistical Databases.
ACM Trans. Database Syst. 12(4): 593-608(1987)@article{DBLP:journals/tods/PalleyS87,
author = {Michael A. Palley and
Jeffrey S. Simonoff},
title = {The Use of Regression Methodology for the Compromise of Confidential
Information in Statistical Databases},
journal = {ACM Trans. Database Syst.},
volume = {12},
number = {4},
year = {1987},
pages = {593-608},
ee = {http://doi.acm.org/10.1145/32204.42174, db/journals/tods/PalleyS87.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
A regression methodology based technique can be used to
compromise confidentiality in a statistical database. This
holds true even when the DBMS prevents application of
regression methodology to the database. Existing inference
controls, including cell restriction, perturbation, and table
restriction approaches, are shown to be generally ineffective
against this compromise technique. The effect of incomplete
supplemental knowledge on the regression methodology based
compromise technique is examined. Finally, some potential
complicators of this disclosure scheme are introduced.
Copyright © 1987 by the ACM,
Inc., used by permission. Permission to make
digital or hard copies is granted provided that
copies are not made or distributed for profit or
direct commercial advantage, and that copies show
this notice on the first page or initial screen of
a display along with the full citation.
CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 2" and ...
BibTeX
References
- [1]
- ...
- [2]
- ...
- [3]
- ...
- [4]
- Leland L. Beck:
A Security Mechanism for Statistical Databases.
ACM Trans. Database Syst. 5(3): 316-338(1980) BibTeX
- [5]
- ...
- [6]
- ...
- [7]
- Francis Y. L. Chin, Gultekin Özsoyoglu:
Auditing and Inference Control in Statistical Databases.
IEEE Trans. Software Eng. 8(6): 574-582(1982) BibTeX
- [8]
- ...
- [9]
- ...
- [10]
- ...
- [11]
- ...
- [12]
- ...
- [13]
- Dorothy E. Denning, Jan Schlörer:
Inference Controls for Statistical Databases.
IEEE Computer 16(7): 69-82(1983) BibTeX
- [14]
- ...
- [15]
- ...
- [16]
- ...
- [17]
- ...
- [18]
- ...
- [19]
- ...
- [20]
- Michael A. Palley:
Security of Statistical Databases - Compromise through Attribute Correlational Modeling.
ICDE 1986: 67-74 BibTeX
- [21]
- Jan Schlörer:
Disclosure from Statistical Databases: Quantitative Aspects of Trackers.
ACM Trans. Database Syst. 5(4): 467-492(1980) BibTeX
- [22]
- Arie Shoshani:
Statistical Databases: Characteristics, Problems, and some Solutions.
VLDB 1982: 208-222 BibTeX
- [23]
- ...
- [24]
- Joseph F. Traub, Yechiam Yemini, Henryk Wozniakowski:
The Statistical Security of a Statistical Database.
ACM Trans. Database Syst. 9(4): 672-679(1984) BibTeX
- [25]
- Jeffrey D. Ullman:
Principles of Database Systems, 2nd Edition.
Computer Science Press 1982, ISBN 0-914894-36-6
BibTeX
- [26]
- Dorothy E. Denning:
Secure Statistical Databases with Random Sample Queries.
ACM Trans. Database Syst. 5(3): 291-315(1980) BibTeX
Referenced by
- Nabil R. Adam, John C. Wortmann:
Security-Control Methods for Statistical Databases: A Comparative Study.
ACM Comput. Surv. 21(4): 515-556(1989)
- Maurizio Rafanelli:
Research Topics in Statistical and Scientific Database Management: the IV SSDBM.
SSDBM 1988: 1-18
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:39:03 2008