-
1
-
-
0013379607
-
A multi-proportions randomized response model
-
(Sept.)
-
Abul-Ela, A.-L., Greenberg, B. G., and Horvitz, D. G. 1967. A multi-proportions randomized response model. J. Am. Stat. Assoc. 62, 319 (Sept.), 990–1008.
-
(1967)
J. Am. Stat. Assoc.
, vol.62
, Issue.319
, pp. 990-1008
-
-
Abul-Ela, A.-L.1
Greenberg, B.G.2
Horvitz, D.G.3
-
2
-
-
0018506338
-
The effectiveness of output modification by rounding for protection of statistical databases
-
(Aug.)
-
Achugbue, J. O., and Chin, F. Y. 1979. The effectiveness of output modification by rounding for protection of statistical databases. INFOR 17, 3 (Aug.), 209–218.
-
(1979)
INFOR
, vol.17
, Issue.3
, pp. 209-218
-
-
Achugbue, J.O.1
Chin, F.Y.2
-
3
-
-
0019056889
-
A security mechanism for statistical databases
-
(Sept.)
-
Beck, L. L. 1980. A security mechanism for statistical databases. ACM Trans. Database Syst. 5, 3 (Sept.), 316–338.
-
(1980)
ACM Trans. Database Syst.
, vol.5
, Issue.3
, pp. 316-338
-
-
Beck, L.L.1
-
4
-
-
0017943805
-
Security in statistical databases for queries with small counts
-
Chin, F. Y. 1978. Security in statistical databases for queries with small counts. ACM Trans. Database Syst. 3, 1, 92–104.
-
(1978)
ACM Trans. Database Syst.
, vol.3
, Issue.1
, pp. 92-104
-
-
Chin, F.Y.1
-
5
-
-
0021459073
-
Efficient inference control for range sum queries
-
Chin, F. Y., Kossowski, P., and Loh, S. C. 1984. Efficient inference control for range sum queries. Theor. Comput. Sci. 32, 77–86.
-
(1984)
Theor. Comput. Sci.
, vol.32
, pp. 77-86
-
-
Chin, F.Y.1
Kossowski, P.2
Loh, S.C.3
-
6
-
-
0020205885
-
Auditing and inference control in statistical databases
-
(Apr.)
-
Chin, F. Y., and ÖzsoyoǦlu, G. 1982. Auditing and inference control in statistical databases. IEEE Trans. Softw. Eng. SE-8, 6 (Apr.), 574–582.
-
(1982)
IEEE Trans. Softw. Eng.
, vol.SE-8
, Issue.6
, pp. 574-582
-
-
Chin, F.Y.1
ÖzsoyoǦlu, G.2
-
7
-
-
0019548231
-
Statistical database design
-
(Mar.)
-
Chin, F. Y., and ÖzsoyoǦlu, G. 1981. Statistical database design. ACM Trans. Database Syst. 6, 1 (Mar.), 113–139.
-
(1981)
ACM Trans. Database Syst.
, vol.6
, Issue.1
, pp. 113-139
-
-
Chin, F.Y.1
ÖzsoyoǦlu, G.2
-
8
-
-
0018678096
-
Security in partitioned dynamic statistical databases
-
Chin, F. Y., and ÖzsoyoǦlu, G. 1979. Security in partitioned dynamic statistical databases. In Proceedings of the IEEE COMPSAC, pp. 594–601.
-
(1979)
Proceedings of the IEEE COMPSAC
, pp. 594-601
-
-
Chin, F.Y.1
ÖzsoyoǦlu, G.2
-
9
-
-
0000082189
-
Suppression methodology and statistical disclosure control
-
(June)
-
Cox, L. H. 1980. Suppression methodology and statistical disclosure control. J. Am. Stat. Assoc. 75, 370 (June), 377-–385.
-
(1980)
J. Am. Stat. Assoc.
, vol.75
, Issue.370
, pp. 377-385
-
-
Cox, L.H.1
-
10
-
-
0006500171
-
A simple procedure for controlled rounding
-
Dalenius, T. 1981. A simple procedure for controlled rounding. Statistik Tidskrift 3, 202–208.
-
(1981)
Statistik Tidskrift
, vol.3
, pp. 202-208
-
-
Dalenius, T.1
-
11
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
Dalenius, T. 1977. Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, 429–444.
-
(1977)
Statistik Tidskrift
, vol.15
, pp. 429-444
-
-
Dalenius, T.1
-
12
-
-
26944441439
-
The invasion of privacy problem and statistics production
-
Dalenius, T. 1974. The invasion of privacy problem and statistics production. An overview. Statistik Tidskrift 12, 213–225.
-
(1974)
An overview. Statistik Tidskrift
, vol.12
, pp. 213-225
-
-
Dalenius, T.1
-
14
-
-
0021138526
-
Cryptographic check-sums for multilevel database security
-
IEEE Computer Society
-
Denning, D. E. 1984. Cryptographic check-sums for multilevel database security. In Proceedings of the 1984 Symposium on Security and Privacy, IEEE Computer Society, pp. 52–61.
-
(1984)
Proceedings of the 1984 Symposium on Security and Privacy
, pp. 52-61
-
-
Denning, D.E.1
-
18
-
-
0019054751
-
Secure statistical databases with random sample queries
-
(Sept.)
-
Denning, D. E. 1980. Secure statistical databases with random sample queries. ACM Trans. Database Syst. 5, 3 (Sept.), 291-315.
-
(1980)
ACM Trans. Database Syst.
, vol.5
, Issue.3
, pp. 291-315
-
-
Denning, D.E.1
-
19
-
-
0020779363
-
Inference control for statistical databases
-
(July)
-
Denning, D. E., and Schlörer, J. 1983. Inference control for statistical databases. Computer 16, 7 (July), 69–82.
-
(1983)
Computer
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.E.1
Schlörer, J.2
-
20
-
-
0018998235
-
A fast procedure for finding a tracker in a statistical database
-
(Mar.)
-
Denning, D. E., and Schlörer, J. 1980. A fast procedure for finding a tracker in a statistical database. ACM Trans. Database Syst. 5,1 (Mar.), 88–102.
-
(1980)
ACM Trans. Database Syst.
, vol.5
, Issue.1
, pp. 88-102
-
-
Denning, D.E.1
Schlörer, J.2
-
21
-
-
84914971340
-
-
Computer Science Dept., Purdue Univ.
-
Denning, D. E., Schlörer, J., and Wehrle, E. 1982. Memoryless inference controls for statistical databases. Computer Science Dept., Purdue Univ.
-
(1982)
Memoryless inference controls for statistical databases
-
-
Denning, D.E.1
Schlörer, J.2
Wehrle, E.3
-
22
-
-
0018442066
-
The tracker: A threat to statistical database security
-
(Mar.)
-
Denning, D. E., Denning, P. J., and Schwartz, M. D. 1979. The tracker: A threat to statistical database security. ACM Trans. Database Syst. 4, 1 (Mar.), 76–96.
-
(1979)
ACM Trans. Database Syst.
, vol.4
, Issue.1
, pp. 76-96
-
-
Denning, D.E.1
Denning, P.J.2
Schwartz, M.D.3
-
23
-
-
0018444418
-
Secure databases: Protection against user influence
-
(Mar.)
-
Dobkin, D., Jones, A. K., and Lipton, R. J. 1979. Secure databases: Protection against user influence. ACM Trans. Database Syst. 4, 1 (Mar.), 97–106.
-
(1979)
ACM Trans. Database Syst.
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.K.2
Lipton, R.J.3
-
24
-
-
0002646970
-
On the question of statistical confidentiality
-
(Mar.)
-
Fellegi, I. P. 1972. On the question of statistical confidentiality. J. Am. Stat. Assoc. 67, 337 (Mar.), 7–18.
-
(1972)
J. Am. Stat. Assoc.
, vol.67
, Issue.337
, pp. 7-18
-
-
Fellegi, I.P.1
-
25
-
-
37849038319
-
Statistical confidentiality: Some theory and applications to data dissemination
-
(Apr.)
-
Fellegi, I. P., and Phillips, J. L. 1974. Statistical confidentiality: Some theory and applications to data dissemination. Ann. Ec. Soc. Meas. 3, 2 (Apr.), 399–409.
-
(1974)
Ann. Ec. Soc. Meas.
, vol.3
, Issue.2
, pp. 399-409
-
-
Fellegi, I.P.1
Phillips, J.L.2
-
27
-
-
0022897692
-
Statistical relational tables for statistical database management
-
Ghosh, S. P. 1986. Statistical relational tables for statistical database management. IEEE Trans. Softw. Eng. SE-12, 12, 1106–1116.
-
(1986)
IEEE Trans. Softw. Eng.
, vol.SE-12
, Issue.12
, pp. 1106-1116
-
-
Ghosh, S.P.1
-
28
-
-
0021452716
-
An application of statistical databases in manufacturing testing
-
Ghosh, S. P. 1985. An application of statistical databases in manufacturing testing. IEEE Trans. Softw. Eng. SE-11, 7, 591–596.
-
(1985)
IEEE Trans. Softw. Eng.
, vol.SE-11
, Issue.7
, pp. 591-596
-
-
Ghosh, S.P.1
-
29
-
-
84976787410
-
An application of statistical databases in manufacturing testing
-
Ghosh, S. P. 1984. An application of statistical databases in manufacturing testing. In Proceedings of IEEE COMPDEC Conference.
-
(1984)
Proceedings of IEEE COMPDEC Conference.
-
-
Ghosh, S.P.1
-
30
-
-
37849018248
-
Application of randomized response technique in obtaining quantitative data
-
America, Statistical Association, (Aug.)
-
Greenberg, B. G., Abernathy, J. R., and Horvitz, D. G. 1969a. Application of randomized response technique in obtaining quantitative data. In Proceedings of Social Statistics Section, America, Statistical Association, (Aug.), 40–43.
-
(1969)
Proceedings of Social Statistics Section
, pp. 40-43
-
-
Greenberg, B.G.1
Abernathy, J.R.2
Horvitz, D.G.3
-
31
-
-
84947377749
-
The unrelated question randomized response model: Theoretical framework
-
(June)
-
Greenberg, B. G., Abul-Ela, A.-L., Simmons, W. R., and Horvitz, D. G. 1969b. The unrelated question randomized response model: Theoretical framework. J. Am. Stat. Assoc. 64, 326 (June), 520–539.
-
(1969)
J. Am. Stat. Assoc.
, vol.64
, Issue.326
, pp. 520-539
-
-
Greenberg, B.G.1
Abul-Ela, A.-L.2
Simmons, W.R.3
Horvitz, D.G.4
-
33
-
-
0016630773
-
Insuring individual’s privacy from statistical database users
-
AFIPS Press, Arlington, Va.
-
Haq, M. I. Ul. 1975. Insuring individual’s privacy from statistical database users. In Proceedings of National Computer Conference (Montvale, N.J.), vol. 44. AFIPS Press, Arlington, Va., pp. 941–946.
-
(1975)
Proceedings of National Computer Conference
, vol.44
, pp. 941-946
-
-
Haq, M.1
Ul, I.2
-
35
-
-
84976810553
-
Getting a personal dossier from a statistical data bank
-
(May)
-
Hoffman, L. J., and Miller, W. F. 1970. Getting a personal dossier from a statistical data bank. Datamation 16, 5 (May), 74–75.
-
(1970)
Datamation
, vol.16
, Issue.5
, pp. 74-75
-
-
Hoffman, L.J.1
Miller, W.F.2
-
36
-
-
0020718732
-
Compromising statistical databases: Responding to queries about means
-
(Mar.)
-
Jonge, W. de 1983. Compromising statistical databases: Responding to queries about means. ACM Trans. Database Syst. 8, 1 (Mar.), 60–80.
-
(1983)
ACM Trans. Database Syst.
, vol.8
, Issue.1
, pp. 60-80
-
-
Jonge, W.1
-
37
-
-
1842510810
-
A model of statistical databases and their security
-
Kam, J. B., and Ullman, J. D. 1977. A model of statistical databases and their security. ACM Trans. Database Syst. 2, 1, 1–10.
-
(1977)
ACM Trans. Database Syst.
, vol.2
, Issue.1
, pp. 1-10
-
-
Kam, J.B.1
Ullman, J.D.2
-
38
-
-
0020947978
-
An analytic approach to statistical databases
-
(Florence, Italy)
-
Lefons, D., Silvestri, A., and Tangorra, F. 1983. An analytic approach to statistical databases. In Proceedings of 9th Conference on Very Large Databases (Florence, Italy), pp. 260–273.
-
(1983)
Proceedings of 9th Conference on Very Large Databases
, pp. 260-273
-
-
Lefons, D.1
Silvestri, A.2
Tangorra, F.3
-
39
-
-
0020303338
-
Randomizing a practical method for protecting statistical databases against compromise
-
Leiss, E. 1982. Randomizing a practical method for protecting statistical databases against compromise. In Proceedings of 8th Conference on Very Large Databases, pp. 189–196.
-
(1982)
Proceedings of 8th Conference on Very Large Databases
, pp. 189-196
-
-
Leiss, E.1
-
40
-
-
0022130080
-
A data distortion by probability distribution
-
Liew, C. K., Choi, W. J., and Liew, C. J. 1985. A data distortion by probability distribution. ACM Trans. Database Syst. 10, 3, 395–411.
-
(1985)
ACM Trans. Database Syst.
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.K.1
Choi, W.J.2
Liew, C.J.3
-
45
-
-
0020125392
-
Enhancing the security of statistical databases with a question-answering system and a kernel design
-
ÖzsoyoǦlu, G., and Chin, F. Y. 1982. Enhancing the security of statistical databases with a question-answering system and a kernel design. IEEE Trans. Softw. Eng. SE-8, 3, 223–234.
-
(1982)
IEEE Trans. Softw. Eng.
, vol.SE-8
, Issue.3
, pp. 223-234
-
-
ÖzsoyoǦlu, G.1
Chin, F.Y.2
-
47
-
-
84918400721
-
Update handling techniques in statistical databases
-
(Berkeley, Calif., Dec)
-
ÖzsoyoǦlu, G., and ÖzsoyoǦlu, M. 1981. Update handling techniques in statistical databases. In Proceedings of the 1st LBL Workshop on Statistical Database Management (Berkeley, Calif., Dec), pp. 249–284.
-
(1981)
Proceedings of the 1st LBL Workshop on Statistical Database Management
, pp. 249-284
-
-
ÖzsoyoǦlu, G.1
ÖzsoyoǦlu, M.2
-
49
-
-
0022583507
-
Security of statistical databases compromise through attribute correlational modeling
-
Palley, M. A. 1986. Security of statistical databases compromise through attribute correlational modeling. In Proceedings of IEEE Conference on Data Engineering, pp. 67–74.
-
(1986)
Proceedings of IEEE Conference on Data Engineering
, pp. 67-74
-
-
Palley, M.A.1
-
50
-
-
84976672368
-
The use of regression methodology for compromise of confidential information in statistical databases
-
(Dec)
-
Palley, M. A., and Simonoff, J. S. 1987. The use of regression methodology for compromise of confidential information in statistical databases. ACM Trans. Database Syst. 12, 4 (Dec), 593–608.
-
(1987)
ACM Trans. Database Syst.
, vol.12
, Issue.4
, pp. 593-608
-
-
Palley, M.A.1
Simonoff, J.S.2
-
52
-
-
0021389555
-
Practical data swapping: The first steps
-
(Mar.)
-
Reiss, S. P. 1984. Practical data swapping: The first steps. ACM Trans. Database Syst. 9, 1 (Mar.), 20–37.
-
(1984)
ACM Trans. Database Syst.
, vol.9
, Issue.1
, pp. 20-37
-
-
Reiss, S.P.1
-
53
-
-
0021310352
-
Diophantine inference from statistical aggregates on few-valued attributes
-
Rowe, N. 1984. Diophantine inference from statistical aggregates on few-valued attributes. In Proceedings of IEEE Conference on Data Engineering, pp. 107–110.
-
(1984)
Proceedings of IEEE Conference on Data Engineering
, pp. 107-110
-
-
Rowe, N.1
-
55
-
-
0020798007
-
Information loss in partitioned statistical databases
-
Schlörer, J. 1983. Information loss in partitioned statistical databases. Comput. J. 26, 3, 218–223.
-
(1983)
Comput. J.
, vol.26
, Issue.3
, pp. 218-223
-
-
Schlörer, J.1
-
56
-
-
0019546487
-
Security of statistical databases: multidimensional transformation
-
(Mar.)
-
Schlörer, J. 1981. Security of statistical databases: multidimensional transformation. ACM Trans. Database Syst. 6, 1 (Mar.), 95–112.
-
(1981)
ACM Trans. Database Syst.
, vol.6
, Issue.1
, pp. 95-112
-
-
Schlörer, J.1
-
57
-
-
0019149034
-
Disclosure from statistical databases: Quantitative aspects of trackers
-
(Dec)
-
Schlörer, J. 1980. Disclosure from statistical databases: Quantitative aspects of trackers. ACM Trans. Database Syst. 5, 4 (Dec), 467–492.
-
(1980)
ACM Trans. Database Syst.
, vol.5
, Issue.4
, pp. 467-492
-
-
Schlörer, J.1
-
58
-
-
0017235318
-
Confidentiality of statistical records: A threat monitoring scheme of on-line dialogue
-
Schlörer, J. 1976. Confidentiality of statistical records: A threat monitoring scheme of on-line dialogue. Methods Inform. Med. 15, 1, 36–42.
-
(1976)
Methods Inform. Med.
, vol.15
, Issue.1
, pp. 36-42
-
-
Schlörer, J.1
-
59
-
-
0016409563
-
Identification and retrieval of personal records from a statistical data bank
-
Schlörer, J. 1975. Identification and retrieval of personal records from a statistical data bank. Methods Info. Med. 14, 1, 7–13.
-
(1975)
Methods Info. Med.
, vol.14
, Issue.1
, pp. 7-13
-
-
Schlörer, J.1
-
60
-
-
0018479599
-
Linear queries in statistical databases
-
Schwartz, M. D., Denning, D. E., and Denning, P. J. 1979. Linear queries in statistical databases. ACM Trans. Database Syst. 4, 2, 156–167.
-
(1979)
ACM Trans. Database Syst.
, vol.4
, Issue.2
, pp. 156-167
-
-
Schwartz, M.D.1
Denning, D.E.2
Denning, P.J.3
-
62
-
-
84976841289
-
Recent results on the noise addition method for database security
-
San Francisco.
-
Tendick, P., and Matloff, N. S. 1987. Recent results on the noise addition method for database security. Presented at the Joint ASA/IMS Statistical Meetings, San Francisco.
-
(1987)
Joint ASA/IMS Statistical Meetings
-
-
Tendick, P.1
Matloff, N.S.2
-
63
-
-
0021622802
-
The statistical security of a statistical database
-
(Dec)
-
Traub, J. F., Yemini, Y., and Wozniakowski, H. 1984. The statistical security of a statistical database. ACM Trans. Database Syst. 9, 4 (Dec), 672–679.
-
(1984)
ACM Trans. Database Syst.
, vol.9
, Issue.4
, pp. 672-679
-
-
Traub, J.F.1
Yemini, Y.2
Wozniakowski, H.3
-
65
-
-
84976663728
-
-
Computers and Security, C. T. Dinardo, Ec AFIPS Press, Arlington, Va.
-
Turn, R., and Shapiro, N. Z. 1978. Privacy and security in databank systems: Measure of effectiveness, costs, and protector-intruder interactions. Computers and Security, C. T. Dinardo, Ec AFIPS Press, Arlington, Va., pp. 49–57.
-
(1978)
Privacy and security in databank systems: Measure of effectiveness, costs, and protector-intruder interactions
, pp. 49-57
-
-
Turn, R.1
Shapiro, N.Z.2
-
66
-
-
0000760605
-
The linear randomized response model
-
Dec.
-
Warner, S. L. 1971. The linear randomized response model. J. Am. Stat. Assoc. 66, 336 (Dec.; 884–888.
-
(1971)
J. Am. Stat. Assoc.
, vol.66
, Issue.336
, pp. 884-888
-
-
Warner, S.L.1
-
67
-
-
0013776710
-
Randomized response: A sur vey technique for eliminating evasive answer bias
-
(Mar.)
-
Warner, S. L. 1965. Randomized response: A sur vey technique for eliminating evasive answer bias J. Am. Stat. Assoc. 60, 309 (Mar.), 63–69.
-
(1965)
J. Am. Stat. Assoc.
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
|