ACM SIGMOD Anthology TODS dblp.uni-trier.de

Practical Data-Swapping: The First Steps.

Steven P. Reiss: Practical Data-Swapping: The First Steps. ACM Trans. Database Syst. 9(1): 20-37(1984)
@article{DBLP:journals/tods/Reiss84,
  author    = {Steven P. Reiss},
  title     = {Practical Data-Swapping: The First Steps},
  journal   = {ACM Trans. Database Syst.},
  volume    = {9},
  number    = {1},
  year      = {1984},
  pages     = {20-37},
  ee        = {http://doi.acm.org/10.1145/348.349, db/journals/tods/Reiss84.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

The problem of statistical database confidentiality in releasing microdata is addressed through the use of approximate data-swapping. Here, a portion of the microdata is replaced with a database that has been selected with approximately the same statistics. The result guarantees the confidentiality of the original data, while providing microdata with accurate statistics. Methods for achieving such transformations are considered and analyzed through simulation.

Copyright © 1984 by the ACM, Inc., used by permission. Permission to make digital or hard copies is granted provided that copies are not made or distributed for profit or direct commercial advantage, and that copies show this notice on the first page or initial screen of a display along with the full citation.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

References

[1]
...
[2]
...
[3]
Richard A. DeMillo, David P. Dobkin, Richard J. Lipton: Even Data Bases That Lie Can Be Compromised. IEEE Trans. Software Eng. 4(1): 73-75(1978) BibTeX
[4]
Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz: The Tracker: A Threat to Statistical Database Security. ACM Trans. Database Syst. 4(1): 76-96(1979) BibTeX
[5]
David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure Databases: Protection Against User Influence. ACM Trans. Database Syst. 4(1): 97-106(1979) BibTeX
[6]
...
[7]
Steven P. Reiss: Security in Databases: A Combinatorial Study. J. ACM 26(1): 45-57(1979) BibTeX
[8]
...
[9]
...
[10]
...
[11]
...
[12]
...
[13]
...
[14]
...
[15]
...

Referenced by

  1. Rakesh Agrawal, Ramakrishnan Srikant: Privacy-Preserving Data Mining. SIGMOD Conference 2000: 439-450
  2. Jon M. Kleinberg, Christos H. Papadimitriou, Prabhakar Raghavan: Auditing Boolean Attributes. PODS 2000: 86-91
  3. Nabil R. Adam, John C. Wortmann: Security-Control Methods for Statistical Databases: A Comparative Study. ACM Comput. Surv. 21(4): 515-556(1989)
  4. Chong K. Liew, Uinam J. Choi, Chung J. Liew: A Data Distortion by Probability Distribution. ACM Trans. Database Syst. 10(3): 395-411(1985)
  5. Steven P. Reiss, Mark J. Post, Tore Dalenius: Non-reversible Privacy Transformations. PODS 1982: 139-146
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:53 2008