ACM SIGMOD Anthology TODS dblp.uni-trier.de

Security of Statistical Databases: Multidimensional Transformation.

Jan Schlörer: Security of Statistical Databases: Multidimensional Transformation. ACM Trans. Database Syst. 6(1): 95-112(1981)
@article{DBLP:journals/tods/Schlorer81,
  author    = {Jan Schl{\"o}rer},
  title     = {Security of Statistical Databases: Multidimensional Transformation},
  journal   = {ACM Trans. Database Syst.},
  volume    = {6},
  number    = {1},
  year      = {1981},
  pages     = {95-112},
  ee        = {http://doi.acm.org/10.1145/319540.319555, db/journals/tods/Schlorer81.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

The concept of multidimensional transformation of statistical databases is described. A given set of statistical output may be compatible with more than one statistical database. A transformed database D' is a database which (1) differs from the original database D in its record content, but (2) produces, within certain limits, the same statistical output as the original database. For a transformable database D there are two options: One may physically transform D into a suitable database D', or one may release only that output which will not permit the users to decide whether it comes from D or D'. The second way is, of course, the easier one. Basic structural requirements for transformable statistical databases are investigated. The closing section discusses advantages, drawbacks, and open questions.

Copyright © 1981 by the ACM, Inc., used by permission. Permission to make digital or hard copies is granted provided that copies are not made or distributed for profit or direct commercial advantage, and that copies show this notice on the first page or initial screen of a display along with the full citation.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

References

[1]
Francis Y. L. Chin: Security in Statistical Databases for Queries with Small Counts. ACM Trans. Database Syst. 3(1): 92-104(1978) BibTeX
[2]
...
[3]
...
[4]
...
[5]
...
[6]
...
[7]
Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz: The Tracker: A Threat to Statistical Database Security. ACM Trans. Database Syst. 4(1): 76-96(1979) BibTeX
[8]
...
[9]
...
[10]
...
[11]
John B. Kam, Jeffrey D. Ullman: A Model of Statistical Databases and Their Security. ACM Trans. Database Syst. 2(1): 1-10(1977) BibTeX
[12]
...
[13]
...
[14]
...
[15]
...
[16]
...
[17]
...
[18]
...
[19]
Jan Schlörer: Disclosure from Statistical Databases: Quantitative Aspects of Trackers. ACM Trans. Database Syst. 5(4): 467-492(1980) BibTeX
[20]
...

Referenced by

  1. Mary McLeish: Further Results on the Security of Partitioned Dynamic Statistical Databases. ACM Trans. Database Syst. 14(1): 98-113(1989)
  2. Nabil R. Adam, John C. Wortmann: Security-Control Methods for Statistical Databases: A Comparative Study. ACM Comput. Surv. 21(4): 515-556(1989)
  3. Zbigniew Michalewicz: Statistical Databases: Their Model, Query Language and Security. SSDBM 1983: 391-402
  4. Dorothy E. Denning: A Security Model for the Statistical Database Problem. SSDBM 1983: 368-390
  5. Jitender S. Deogun, Vijay V. Raghavan: Query Directed Partitioning Scheme for Securing Statistical Databases. SSDBM 1981: 285-293
  6. Francis Y. L. Chin, Peter Kossowski: Efficient Inference Control for Range SUM Queries on Statistical Data Bases. SSDBM 1981: 239-248
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:45 2008