Disclosure from Statistical Databases: Quantitative Aspects of Trackers.
Jan Schlörer:
Disclosure from Statistical Databases: Quantitative Aspects of Trackers.
ACM Trans. Database Syst. 5(4): 467-492(1980)@article{DBLP:journals/tods/Schlorer80,
author = {Jan Schl{\"o}rer},
title = {Disclosure from Statistical Databases: Quantitative Aspects of
Trackers},
journal = {ACM Trans. Database Syst.},
volume = {5},
number = {4},
year = {1980},
pages = {467-492},
ee = {http://doi.acm.org/10.1145/320610.320645, db/journals/tods/Schlorer80.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
Statistical evaluation of databases which contain personal records may
entail risks for the confidentiality of the individual records.
The risk has increased with the availability of flexible interactive
evaluation programs which permit the use of trackers, the most
dangerous class of snooping tools known. A class of trackers,
called union trackers, is described. They permit reconstruction of the
entire database without supplementary knowledge and include the
general tracker recently described as a special case. For many real
statistical databases the overwhelming majority of definable sets of
records will form trackers. For such databases a random search for a
tracker is likely to succeed rapidly. Individual trackers are
redefined and counted and their cardinalities are investigated.
If there are n records in the database, then most individual trackers
employ innocent cardinalities near n/3, making them difficult
data element.
Copyright © 1980 by the ACM,
Inc., used by permission. Permission to make
digital or hard copies is granted provided that
copies are not made or distributed for profit or
direct commercial advantage, and that copies show
this notice on the first page or initial screen of
a display along with the full citation.
CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 2" and ...
BibTeX
References
- [1]
- Francis Y. L. Chin:
Security in Statistical Databases for Queries with Small Counts.
ACM Trans. Database Syst. 3(1): 92-104(1978) BibTeX
- [2]
- ...
- [3]
- ...
- [4]
- ...
- [5]
- Dorothy E. Denning:
Secure Statistical Databases with Random Sample Queries.
ACM Trans. Database Syst. 5(3): 291-315(1980) BibTeX
- [6]
- Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz:
The Tracker: A Threat to Statistical Database Security.
ACM Trans. Database Syst. 4(1): 76-96(1979) BibTeX
- [7]
- Dorothy E. Denning, Jan Schlörer:
A Fast Procedure for Finding a Tracker in a Statistical Database.
ACM Trans. Database Syst. 5(1): 88-102(1980) BibTeX
- [8]
- David P. Dobkin, Anita K. Jones, Richard J. Lipton:
Secure Databases: Protection Against User Influence.
ACM Trans. Database Syst. 4(1): 97-106(1979) BibTeX
- [9]
- ...
- [10]
- ...
- [11]
- ...
- [12]
- ...
- [13]
- ...
- [14]
- ...
- [15]
- ...
- [16]
- ...
- [17]
- John B. Kam, Jeffrey D. Ullman:
A Model of Statistical Databases and Their Security.
ACM Trans. Database Syst. 2(1): 1-10(1977) BibTeX
- [18]
- ...
- [19]
- ...
- [20]
- ...
- [21]
- ...
- [22]
- ...
- [23]
- ...
- [24]
- ...
- [25]
- ...
- [26]
- ...
- [27]
- Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning:
Linear Queries in Statistical Databases.
ACM Trans. Database Syst. 4(2): 156-167(1979) BibTeX
- [28]
- ...
- [29]
- ...
- [30]
- ...
- [31]
- ...
- [32]
- Clement T. Yu, Francis Y. L. Chin:
A Study on the Protection of Statistical Data Bases.
SIGMOD Conference 1977: 169-181 BibTeX
Referenced by
- Patrick Tendick, Norman S. Matloff:
A Modified Random Perturbation Method for Database Security.
ACM Trans. Database Syst. 19(1): 47-63(1994)
- Sakti P. Ghosh:
Statistical Relational Databases: Normal Forms.
IEEE Trans. Knowl. Data Eng. 3(1): 55-64(1991)
- Zbigniew Michalewicz, Jia-Jie Li, Keh-Wei Chen:
Optimal Distribution of Restricted Ranges in Secure Statistical Database.
SSDBM 1990: 65-79
- Nabil R. Adam, John C. Wortmann:
Security-Control Methods for Statistical Databases: A Comparative Study.
ACM Comput. Surv. 21(4): 515-556(1989)
- Maurizio Rafanelli:
Research Topics in Statistical and Scientific Database Management: the IV SSDBM.
SSDBM 1988: 1-18
- Zbigniew Michalewicz, Keh-Wei Chen:
Ranges and Trackers in Statistical Databases.
SSDBM 1988: 193-206
- Michael A. Palley, Jeffrey S. Simonoff:
The Use of Regression Methodology for the Compromise of Confidential Information in Statistical Databases.
ACM Trans. Database Syst. 12(4): 593-608(1987)
- Michael A. Palley:
Security of Statistical Databases - Compromise through Attribute Correlational Modeling.
ICDE 1986: 67-74
- Joseph F. Traub, Yechiam Yemini, Henryk Wozniakowski:
The Statistical Security of a Statistical Database.
ACM Trans. Database Syst. 9(4): 672-679(1984)
- Wiebren de Jonge:
Compromising Statistical Databases Responding to Queries about Means.
ACM Trans. Database Syst. 8(1): 60-80(1983)
- Zbigniew Michalewicz:
Statistical Databases: Their Model, Query Language and Security.
SSDBM 1983: 391-402
- Dorothy E. Denning:
A Security Model for the Statistical Database Problem.
SSDBM 1983: 368-390
- Jan Schlörer:
Security of Statistical Databases: Multidimensional Transformation.
ACM Trans. Database Syst. 6(1): 95-112(1981)
- Jitender S. Deogun, Vijay V. Raghavan:
Query Directed Partitioning Scheme for Securing Statistical Databases.
SSDBM 1981: 285-293
- Dorothy E. Denning, Jan Schlörer:
A Fast Procedure for Finding a Tracker in a Statistical Database.
ACM Trans. Database Syst. 5(1): 88-102(1980)
- Dorothy E. Denning:
Secure Statistical Databases with Random Sample Queries.
ACM Trans. Database Syst. 5(3): 291-315(1980)
- Leland L. Beck:
A Security Mechanism for Statistical Databases.
ACM Trans. Database Syst. 5(3): 316-338(1980)
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:44 2008