-
1
-
-
0024914229
-
Security control methods for statistical databases: A comparative survey
-
Adam, N. R., & Wortmann, J. C. (1989). Security control methods for statistical databases: A comparative survey. ACM Computing Surveys, 21(4), 515-556.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
3
-
-
2242464139
-
Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise
-
Duncan, G. T., & Mukherjee, S. (2000). Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. Journal of the American Statistical Association, 95(3), 720-729.
-
(2000)
Journal of the American Statistical Association
, vol.95
, Issue.3
, pp. 720-729
-
-
Duncan, G.T.1
Mukherjee, S.2
-
4
-
-
0033349024
-
Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators
-
Dutta Chowdhury, S., Duncan, G. T., Krishnan, R., Roehrig, S. F., & Mukherjee, S. (1999). Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators. Management Science, 45(12), 1710-1723.
-
(1999)
Management Science
, vol.45
, Issue.12
, pp. 1710-1723
-
-
Dutta Chowdhury, S.1
Duncan, G.T.2
Krishnan, R.3
Roehrig, S.F.4
Mukherjee, S.5
-
5
-
-
0040001837
-
Gramm-Leach-Bliley Act (S. 900): A major step toward financial deregulation
-
John, D. C. (1999). Gramm-Leach-Bliley Act (S. 900): A major step toward financial deregulation. The Heritage Foundation Backgrounder, (http://www.heritage.org/library/backgrounder/bg1338.html), 1338.
-
(1999)
The Heritage Foundation Backgrounder
, pp. 1338
-
-
John, D.C.1
-
7
-
-
2942515548
-
A matter of trust
-
Jorgensen, B. (2000). A matter of trust. Electronic Business, 26(13), 119.
-
(2000)
Electronic Business
, vol.26
, Issue.13
, pp. 119
-
-
Jorgensen, B.1
-
8
-
-
0033207750
-
A general additive perturbation method for database security
-
Muralidhar, K., Parsa, R., & Sarathy, R. (1999). A general additive perturbation method for database security. Management Science, 45(10), 1399-1415.
-
(1999)
Management Science
, vol.45
, Issue.10
, pp. 1399-1415
-
-
Muralidhar, K.1
Parsa, R.2
Sarathy, R.3
-
9
-
-
84976672368
-
The use of regression methodology for the compromise of confidential information in databases
-
Palley, M. A., & Simonoff, J. S. (1987). The use of regression methodology for the compromise of confidential information in databases. ACM Transactions on Database Systems, 12(4), 593-608.
-
(1987)
ACM Transactions on Database Systems
, vol.12
, Issue.4
, pp. 593-608
-
-
Palley, M.A.1
Simonoff, J.S.2
-
10
-
-
0040595001
-
It's up to e-businesses to 'get over' privacy issue
-
February 5, (Editor's Note)
-
Preston, R. (February 5, 2001). It's up to e-businesses to 'get over' privacy issue (Editor's Note). InternetWeek, p. 9.
-
(2001)
InternetWeek
, pp. 9
-
-
Preston, R.1
-
11
-
-
33646343669
-
Census bureau blurs data to keep names confidential
-
February 14
-
Simpson, G. R. (2001). Census bureau blurs data to keep names confidential. Wall Street Journal Online (http://www.wsj.com), February 14, p. B1.
-
(2001)
Wall Street Journal Online
-
-
Simpson, G.R.1
-
12
-
-
44949285668
-
Optimal noise addition for preserving confidentiality in multivariate data
-
Tendick, P. (1991). Optimal noise addition for preserving confidentiality in multivariate data. Journal of Statistical Planning and Inference, 27(2), 341-353.
-
(1991)
Journal of Statistical Planning and Inference
, vol.27
, Issue.2
, pp. 341-353
-
-
Tendick, P.1
-
13
-
-
0028393221
-
A modified random perturbation for database security
-
Tendick, P., & Matloff, N. (1994). A modified random perturbation for database security. ACM Transactions on Database Systems, 19(1), 47-63.
-
(1994)
ACM Transactions on Database Systems
, vol.19
, Issue.1
, pp. 47-63
-
-
Tendick, P.1
Matloff, N.2
|