Linear Queries in Statistical Databases.
Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning:
Linear Queries in Statistical Databases.
ACM Trans. Database Syst. 4(2): 156-167(1979)@article{DBLP:journals/tods/Schwartz79,
author = {Mayer D. Schwartz and
Dorothy E. Denning and
Peter J. Denning},
title = {Linear Queries in Statistical Databases},
journal = {ACM Trans. Database Syst.},
volume = {4},
number = {2},
year = {1979},
pages = {156-167},
ee = {http://doi.acm.org/10.1145/320071.320073, db/journals/tods/Schwartz79.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
A database is compromised if a user can determine the data elements associated with
keys which he did not know previously. If it is possible, compromise can be achieved
by posing a finite set of queries over sets of data elements and employing initial
information to solve the resulting system of equations. Assuming the allowable queries
are linear, that is, weighted sums of data elements, we show how compromise can be
achieved and we characterize the maximal initial information permitted of a user in a
secure system. When compromise is possible, the initial information and the number of
queries required to achieve it is surprisingly small.
Copyright © 1979 by the ACM,
Inc., used by permission. Permission to make
digital or hard copies is granted provided that
copies are not made or distributed for profit or
direct commercial advantage, and that copies show
this notice on the first page or initial screen of
a display along with the full citation.
CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 2" and ...
BibTeX
References
- [1]
- Francis Y. L. Chin:
Security in Statistical Databases for Queries with Small Counts.
ACM Trans. Database Syst. 3(1): 92-104(1978) BibTeX
- [2]
- George I. Davida, David J. Linton, C. Russel Szelag, David L. Wells:
Database Security.
IEEE Trans. Software Eng. 4(6): 531-533(1978) BibTeX
- [3]
- Richard A. DeMillo, David P. Dobkin, Richard J. Lipton:
Even Data Bases That Lie Can Be Compromised.
IEEE Trans. Software Eng. 4(1): 73-75(1978) BibTeX
- [4]
- Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz:
The Tracker: A Threat to Statistical Database Security.
ACM Trans. Database Syst. 4(1): 76-96(1979) BibTeX
- [5]
- ...
- [6]
- David P. Dobkin, Anita K. Jones, Richard J. Lipton:
Secure Databases: Protection Against User Influence.
ACM Trans. Database Syst. 4(1): 97-106(1979) BibTeX
- [7]
- ...
- [8]
- ...
- [9]
- ...
- [10]
- ...
- [11]
- ...
- [12]
- ...
- [13]
- John B. Kam, Jeffrey D. Ullman:
A Model of Statistical Databases and Their Security.
ACM Trans. Database Syst. 2(1): 1-10(1977) BibTeX
- [14]
- ...
- [15]
- ...
- [16]
- ...
- [17]
- ...
- [18]
- ...
Referenced by
- Francesco M. Malvestuto:
A Universal-Scheme Approach to Statistical Databases Containing Homogeneous Summary Tables.
ACM Trans. Database Syst. 18(4): 678-708(1993)
- Mary McLeish:
Further Results on the Security of Partitioned Dynamic Statistical Databases.
ACM Trans. Database Syst. 14(1): 98-113(1989)
- Nabil R. Adam, John C. Wortmann:
Security-Control Methods for Statistical Databases: A Comparative Study.
ACM Comput. Surv. 21(4): 515-556(1989)
- Robert P. Trueblood, H. Rex Hartson, Johannes J. Martin:
MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management.
ACM Trans. Database Syst. 8(3): 382-409(1983)
- Wiebren de Jonge:
Compromising Statistical Databases Responding to Queries about Means.
ACM Trans. Database Syst. 8(1): 60-80(1983)
- Zbigniew Michalewicz:
Statistical Databases: Their Model, Query Language and Security.
SSDBM 1983: 391-402
- Dorothy E. Denning:
A Security Model for the Statistical Database Problem.
SSDBM 1983: 368-390
- Ernst L. Leiss:
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise.
VLDB 1982: 189-196
- Jan Schlörer:
Disclosure from Statistical Databases: Quantitative Aspects of Trackers.
ACM Trans. Database Syst. 5(4): 467-492(1980)
- Dorothy E. Denning:
Corrigenda: Linear Queries in Statistical Databases.
ACM Trans. Database Syst. 5(3): 383(1980)
- Dorothy E. Denning:
Secure Statistical Databases with Random Sample Queries.
ACM Trans. Database Syst. 5(3): 291-315(1980)
- Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz:
The Tracker: A Threat to Statistical Database Security.
ACM Trans. Database Syst. 4(1): 76-96(1979)
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:40 2008