메뉴 건너뛰기




Volumn 21, Issue 4, 1989, Pages 515-556

Security-control methods for statistical databases: A comparative study

Author keywords

Compromise; controls; disclosure; inference; security

Indexed keywords

DATA PROCESSING--SECURITY OF DATA;

EID: 0024914229     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/76894.76895     Document Type: Article
Times cited : (667)

References (68)
  • 1
    • 0013379607 scopus 로고
    • A multi-proportions randomized response model
    • (Sept.)
    • Abul-Ela, A.-L., Greenberg, B. G., and Horvitz, D. G. 1967. A multi-proportions randomized response model. J. Am. Stat. Assoc. 62, 319 (Sept.), 990–1008.
    • (1967) J. Am. Stat. Assoc. , vol.62 , Issue.319 , pp. 990-1008
    • Abul-Ela, A.-L.1    Greenberg, B.G.2    Horvitz, D.G.3
  • 2
    • 0018506338 scopus 로고
    • The effectiveness of output modification by rounding for protection of statistical databases
    • (Aug.)
    • Achugbue, J. O., and Chin, F. Y. 1979. The effectiveness of output modification by rounding for protection of statistical databases. INFOR 17, 3 (Aug.), 209–218.
    • (1979) INFOR , vol.17 , Issue.3 , pp. 209-218
    • Achugbue, J.O.1    Chin, F.Y.2
  • 3
    • 0019056889 scopus 로고
    • A security mechanism for statistical databases
    • (Sept.)
    • Beck, L. L. 1980. A security mechanism for statistical databases. ACM Trans. Database Syst. 5, 3 (Sept.), 316–338.
    • (1980) ACM Trans. Database Syst. , vol.5 , Issue.3 , pp. 316-338
    • Beck, L.L.1
  • 4
    • 0017943805 scopus 로고
    • Security in statistical databases for queries with small counts
    • Chin, F. Y. 1978. Security in statistical databases for queries with small counts. ACM Trans. Database Syst. 3, 1, 92–104.
    • (1978) ACM Trans. Database Syst. , vol.3 , Issue.1 , pp. 92-104
    • Chin, F.Y.1
  • 5
    • 0021459073 scopus 로고
    • Efficient inference control for range sum queries
    • Chin, F. Y., Kossowski, P., and Loh, S. C. 1984. Efficient inference control for range sum queries. Theor. Comput. Sci. 32, 77–86.
    • (1984) Theor. Comput. Sci. , vol.32 , pp. 77-86
    • Chin, F.Y.1    Kossowski, P.2    Loh, S.C.3
  • 6
    • 0020205885 scopus 로고
    • Auditing and inference control in statistical databases
    • (Apr.)
    • Chin, F. Y., and ÖzsoyoǦlu, G. 1982. Auditing and inference control in statistical databases. IEEE Trans. Softw. Eng. SE-8, 6 (Apr.), 574–582.
    • (1982) IEEE Trans. Softw. Eng. , vol.SE-8 , Issue.6 , pp. 574-582
    • Chin, F.Y.1    ÖzsoyoǦlu, G.2
  • 7
  • 8
    • 0018678096 scopus 로고
    • Security in partitioned dynamic statistical databases
    • Chin, F. Y., and ÖzsoyoǦlu, G. 1979. Security in partitioned dynamic statistical databases. In Proceedings of the IEEE COMPSAC, pp. 594–601.
    • (1979) Proceedings of the IEEE COMPSAC , pp. 594-601
    • Chin, F.Y.1    ÖzsoyoǦlu, G.2
  • 9
    • 0000082189 scopus 로고
    • Suppression methodology and statistical disclosure control
    • (June)
    • Cox, L. H. 1980. Suppression methodology and statistical disclosure control. J. Am. Stat. Assoc. 75, 370 (June), 377-–385.
    • (1980) J. Am. Stat. Assoc. , vol.75 , Issue.370 , pp. 377-385
    • Cox, L.H.1
  • 10
    • 0006500171 scopus 로고
    • A simple procedure for controlled rounding
    • Dalenius, T. 1981. A simple procedure for controlled rounding. Statistik Tidskrift 3, 202–208.
    • (1981) Statistik Tidskrift , vol.3 , pp. 202-208
    • Dalenius, T.1
  • 11
    • 0012793677 scopus 로고
    • Towards a methodology for statistical disclosure control
    • Dalenius, T. 1977. Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, 429–444.
    • (1977) Statistik Tidskrift , vol.15 , pp. 429-444
    • Dalenius, T.1
  • 12
    • 26944441439 scopus 로고
    • The invasion of privacy problem and statistics production
    • Dalenius, T. 1974. The invasion of privacy problem and statistics production. An overview. Statistik Tidskrift 12, 213–225.
    • (1974) An overview. Statistik Tidskrift , vol.12 , pp. 213-225
    • Dalenius, T.1
  • 14
    • 0021138526 scopus 로고
    • Cryptographic check-sums for multilevel database security
    • IEEE Computer Society
    • Denning, D. E. 1984. Cryptographic check-sums for multilevel database security. In Proceedings of the 1984 Symposium on Security and Privacy, IEEE Computer Society, pp. 52–61.
    • (1984) Proceedings of the 1984 Symposium on Security and Privacy , pp. 52-61
    • Denning, D.E.1
  • 18
    • 0019054751 scopus 로고
    • Secure statistical databases with random sample queries
    • (Sept.)
    • Denning, D. E. 1980. Secure statistical databases with random sample queries. ACM Trans. Database Syst. 5, 3 (Sept.), 291-315.
    • (1980) ACM Trans. Database Syst. , vol.5 , Issue.3 , pp. 291-315
    • Denning, D.E.1
  • 19
    • 0020779363 scopus 로고
    • Inference control for statistical databases
    • (July)
    • Denning, D. E., and Schlörer, J. 1983. Inference control for statistical databases. Computer 16, 7 (July), 69–82.
    • (1983) Computer , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.E.1    Schlörer, J.2
  • 20
    • 0018998235 scopus 로고
    • A fast procedure for finding a tracker in a statistical database
    • (Mar.)
    • Denning, D. E., and Schlörer, J. 1980. A fast procedure for finding a tracker in a statistical database. ACM Trans. Database Syst. 5,1 (Mar.), 88–102.
    • (1980) ACM Trans. Database Syst. , vol.5 , Issue.1 , pp. 88-102
    • Denning, D.E.1    Schlörer, J.2
  • 22
    • 0018442066 scopus 로고
    • The tracker: A threat to statistical database security
    • (Mar.)
    • Denning, D. E., Denning, P. J., and Schwartz, M. D. 1979. The tracker: A threat to statistical database security. ACM Trans. Database Syst. 4, 1 (Mar.), 76–96.
    • (1979) ACM Trans. Database Syst. , vol.4 , Issue.1 , pp. 76-96
    • Denning, D.E.1    Denning, P.J.2    Schwartz, M.D.3
  • 23
    • 0018444418 scopus 로고
    • Secure databases: Protection against user influence
    • (Mar.)
    • Dobkin, D., Jones, A. K., and Lipton, R. J. 1979. Secure databases: Protection against user influence. ACM Trans. Database Syst. 4, 1 (Mar.), 97–106.
    • (1979) ACM Trans. Database Syst. , vol.4 , Issue.1 , pp. 97-106
    • Dobkin, D.1    Jones, A.K.2    Lipton, R.J.3
  • 24
    • 0002646970 scopus 로고
    • On the question of statistical confidentiality
    • (Mar.)
    • Fellegi, I. P. 1972. On the question of statistical confidentiality. J. Am. Stat. Assoc. 67, 337 (Mar.), 7–18.
    • (1972) J. Am. Stat. Assoc. , vol.67 , Issue.337 , pp. 7-18
    • Fellegi, I.P.1
  • 25
    • 37849038319 scopus 로고
    • Statistical confidentiality: Some theory and applications to data dissemination
    • (Apr.)
    • Fellegi, I. P., and Phillips, J. L. 1974. Statistical confidentiality: Some theory and applications to data dissemination. Ann. Ec. Soc. Meas. 3, 2 (Apr.), 399–409.
    • (1974) Ann. Ec. Soc. Meas. , vol.3 , Issue.2 , pp. 399-409
    • Fellegi, I.P.1    Phillips, J.L.2
  • 27
    • 0022897692 scopus 로고
    • Statistical relational tables for statistical database management
    • Ghosh, S. P. 1986. Statistical relational tables for statistical database management. IEEE Trans. Softw. Eng. SE-12, 12, 1106–1116.
    • (1986) IEEE Trans. Softw. Eng. , vol.SE-12 , Issue.12 , pp. 1106-1116
    • Ghosh, S.P.1
  • 28
    • 0021452716 scopus 로고
    • An application of statistical databases in manufacturing testing
    • Ghosh, S. P. 1985. An application of statistical databases in manufacturing testing. IEEE Trans. Softw. Eng. SE-11, 7, 591–596.
    • (1985) IEEE Trans. Softw. Eng. , vol.SE-11 , Issue.7 , pp. 591-596
    • Ghosh, S.P.1
  • 29
    • 84976787410 scopus 로고
    • An application of statistical databases in manufacturing testing
    • Ghosh, S. P. 1984. An application of statistical databases in manufacturing testing. In Proceedings of IEEE COMPDEC Conference.
    • (1984) Proceedings of IEEE COMPDEC Conference.
    • Ghosh, S.P.1
  • 30
    • 37849018248 scopus 로고
    • Application of randomized response technique in obtaining quantitative data
    • America, Statistical Association, (Aug.)
    • Greenberg, B. G., Abernathy, J. R., and Horvitz, D. G. 1969a. Application of randomized response technique in obtaining quantitative data. In Proceedings of Social Statistics Section, America, Statistical Association, (Aug.), 40–43.
    • (1969) Proceedings of Social Statistics Section , pp. 40-43
    • Greenberg, B.G.1    Abernathy, J.R.2    Horvitz, D.G.3
  • 31
    • 84947377749 scopus 로고
    • The unrelated question randomized response model: Theoretical framework
    • (June)
    • Greenberg, B. G., Abul-Ela, A.-L., Simmons, W. R., and Horvitz, D. G. 1969b. The unrelated question randomized response model: Theoretical framework. J. Am. Stat. Assoc. 64, 326 (June), 520–539.
    • (1969) J. Am. Stat. Assoc. , vol.64 , Issue.326 , pp. 520-539
    • Greenberg, B.G.1    Abul-Ela, A.-L.2    Simmons, W.R.3    Horvitz, D.G.4
  • 33
    • 0016630773 scopus 로고
    • Insuring individual’s privacy from statistical database users
    • AFIPS Press, Arlington, Va.
    • Haq, M. I. Ul. 1975. Insuring individual’s privacy from statistical database users. In Proceedings of National Computer Conference (Montvale, N.J.), vol. 44. AFIPS Press, Arlington, Va., pp. 941–946.
    • (1975) Proceedings of National Computer Conference , vol.44 , pp. 941-946
    • Haq, M.1    Ul, I.2
  • 35
    • 84976810553 scopus 로고
    • Getting a personal dossier from a statistical data bank
    • (May)
    • Hoffman, L. J., and Miller, W. F. 1970. Getting a personal dossier from a statistical data bank. Datamation 16, 5 (May), 74–75.
    • (1970) Datamation , vol.16 , Issue.5 , pp. 74-75
    • Hoffman, L.J.1    Miller, W.F.2
  • 36
    • 0020718732 scopus 로고
    • Compromising statistical databases: Responding to queries about means
    • (Mar.)
    • Jonge, W. de 1983. Compromising statistical databases: Responding to queries about means. ACM Trans. Database Syst. 8, 1 (Mar.), 60–80.
    • (1983) ACM Trans. Database Syst. , vol.8 , Issue.1 , pp. 60-80
    • Jonge, W.1
  • 37
    • 1842510810 scopus 로고
    • A model of statistical databases and their security
    • Kam, J. B., and Ullman, J. D. 1977. A model of statistical databases and their security. ACM Trans. Database Syst. 2, 1, 1–10.
    • (1977) ACM Trans. Database Syst. , vol.2 , Issue.1 , pp. 1-10
    • Kam, J.B.1    Ullman, J.D.2
  • 39
    • 0020303338 scopus 로고
    • Randomizing a practical method for protecting statistical databases against compromise
    • Leiss, E. 1982. Randomizing a practical method for protecting statistical databases against compromise. In Proceedings of 8th Conference on Very Large Databases, pp. 189–196.
    • (1982) Proceedings of 8th Conference on Very Large Databases , pp. 189-196
    • Leiss, E.1
  • 40
    • 0022130080 scopus 로고
    • A data distortion by probability distribution
    • Liew, C. K., Choi, W. J., and Liew, C. J. 1985. A data distortion by probability distribution. ACM Trans. Database Syst. 10, 3, 395–411.
    • (1985) ACM Trans. Database Syst. , vol.10 , Issue.3 , pp. 395-411
    • Liew, C.K.1    Choi, W.J.2    Liew, C.J.3
  • 45
    • 0020125392 scopus 로고
    • Enhancing the security of statistical databases with a question-answering system and a kernel design
    • ÖzsoyoǦlu, G., and Chin, F. Y. 1982. Enhancing the security of statistical databases with a question-answering system and a kernel design. IEEE Trans. Softw. Eng. SE-8, 3, 223–234.
    • (1982) IEEE Trans. Softw. Eng. , vol.SE-8 , Issue.3 , pp. 223-234
    • ÖzsoyoǦlu, G.1    Chin, F.Y.2
  • 49
    • 0022583507 scopus 로고
    • Security of statistical databases compromise through attribute correlational modeling
    • Palley, M. A. 1986. Security of statistical databases compromise through attribute correlational modeling. In Proceedings of IEEE Conference on Data Engineering, pp. 67–74.
    • (1986) Proceedings of IEEE Conference on Data Engineering , pp. 67-74
    • Palley, M.A.1
  • 50
    • 84976672368 scopus 로고
    • The use of regression methodology for compromise of confidential information in statistical databases
    • (Dec)
    • Palley, M. A., and Simonoff, J. S. 1987. The use of regression methodology for compromise of confidential information in statistical databases. ACM Trans. Database Syst. 12, 4 (Dec), 593–608.
    • (1987) ACM Trans. Database Syst. , vol.12 , Issue.4 , pp. 593-608
    • Palley, M.A.1    Simonoff, J.S.2
  • 52
    • 0021389555 scopus 로고
    • Practical data swapping: The first steps
    • (Mar.)
    • Reiss, S. P. 1984. Practical data swapping: The first steps. ACM Trans. Database Syst. 9, 1 (Mar.), 20–37.
    • (1984) ACM Trans. Database Syst. , vol.9 , Issue.1 , pp. 20-37
    • Reiss, S.P.1
  • 53
    • 0021310352 scopus 로고
    • Diophantine inference from statistical aggregates on few-valued attributes
    • Rowe, N. 1984. Diophantine inference from statistical aggregates on few-valued attributes. In Proceedings of IEEE Conference on Data Engineering, pp. 107–110.
    • (1984) Proceedings of IEEE Conference on Data Engineering , pp. 107-110
    • Rowe, N.1
  • 55
    • 0020798007 scopus 로고
    • Information loss in partitioned statistical databases
    • Schlörer, J. 1983. Information loss in partitioned statistical databases. Comput. J. 26, 3, 218–223.
    • (1983) Comput. J. , vol.26 , Issue.3 , pp. 218-223
    • Schlörer, J.1
  • 56
    • 0019546487 scopus 로고
    • Security of statistical databases: multidimensional transformation
    • (Mar.)
    • Schlörer, J. 1981. Security of statistical databases: multidimensional transformation. ACM Trans. Database Syst. 6, 1 (Mar.), 95–112.
    • (1981) ACM Trans. Database Syst. , vol.6 , Issue.1 , pp. 95-112
    • Schlörer, J.1
  • 57
    • 0019149034 scopus 로고
    • Disclosure from statistical databases: Quantitative aspects of trackers
    • (Dec)
    • Schlörer, J. 1980. Disclosure from statistical databases: Quantitative aspects of trackers. ACM Trans. Database Syst. 5, 4 (Dec), 467–492.
    • (1980) ACM Trans. Database Syst. , vol.5 , Issue.4 , pp. 467-492
    • Schlörer, J.1
  • 58
    • 0017235318 scopus 로고
    • Confidentiality of statistical records: A threat monitoring scheme of on-line dialogue
    • Schlörer, J. 1976. Confidentiality of statistical records: A threat monitoring scheme of on-line dialogue. Methods Inform. Med. 15, 1, 36–42.
    • (1976) Methods Inform. Med. , vol.15 , Issue.1 , pp. 36-42
    • Schlörer, J.1
  • 59
    • 0016409563 scopus 로고
    • Identification and retrieval of personal records from a statistical data bank
    • Schlörer, J. 1975. Identification and retrieval of personal records from a statistical data bank. Methods Info. Med. 14, 1, 7–13.
    • (1975) Methods Info. Med. , vol.14 , Issue.1 , pp. 7-13
    • Schlörer, J.1
  • 62
    • 84976841289 scopus 로고
    • Recent results on the noise addition method for database security
    • San Francisco.
    • Tendick, P., and Matloff, N. S. 1987. Recent results on the noise addition method for database security. Presented at the Joint ASA/IMS Statistical Meetings, San Francisco.
    • (1987) Joint ASA/IMS Statistical Meetings
    • Tendick, P.1    Matloff, N.S.2
  • 63
    • 0021622802 scopus 로고
    • The statistical security of a statistical database
    • (Dec)
    • Traub, J. F., Yemini, Y., and Wozniakowski, H. 1984. The statistical security of a statistical database. ACM Trans. Database Syst. 9, 4 (Dec), 672–679.
    • (1984) ACM Trans. Database Syst. , vol.9 , Issue.4 , pp. 672-679
    • Traub, J.F.1    Yemini, Y.2    Wozniakowski, H.3
  • 66
    • 0000760605 scopus 로고
    • The linear randomized response model
    • Dec.
    • Warner, S. L. 1971. The linear randomized response model. J. Am. Stat. Assoc. 66, 336 (Dec.; 884–888.
    • (1971) J. Am. Stat. Assoc. , vol.66 , Issue.336 , pp. 884-888
    • Warner, S.L.1
  • 67
    • 0013776710 scopus 로고
    • Randomized response: A sur vey technique for eliminating evasive answer bias
    • (Mar.)
    • Warner, S. L. 1965. Randomized response: A sur vey technique for eliminating evasive answer bias J. Am. Stat. Assoc. 60, 309 (Mar.), 63–69.
    • (1965) J. Am. Stat. Assoc. , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.