-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. Adam, J. Wortman, Security-control methods for statistical databases: a comparative study. ACM Comput. Surveys 21 (4) (1989) 515-556.
-
(1989)
ACM Comput. Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.1
Wortman, J.2
-
2
-
-
0019056889
-
A security mechanism for statistical databases
-
L. Beck, A security mechanism for statistical databases, ACM TODS 5 (3) (1980) 316-338.
-
(1980)
ACM TODS
, vol.5
, Issue.3
, pp. 316-338
-
-
Beck, L.1
-
3
-
-
0017943805
-
Security in statistical databases for queries with small counts
-
F. Chin, Security in statistical databases for queries with small counts, ACM TODS 3(1) (1978) 92-104.
-
(1978)
ACM TODS
, vol.3
, Issue.1
, pp. 92-104
-
-
Chin, F.1
-
4
-
-
0019548231
-
Statistical database design
-
F. Chin, O. Ösoyoglu, Statistical database design, ACM TODS 6 (1) (1981) 113-139.
-
(1981)
ACM TODS
, vol.6
, Issue.1
, pp. 113-139
-
-
Chin, F.1
Ösoyoglu, O.2
-
5
-
-
0038163581
-
Auditing and inference control in statistical databases
-
F. Chin, G. Ösoyoglu, Auditing and inference control in statistical databases, IEEE SE-8 1 (1982) 574-582.
-
(1982)
IEEE SE-8
, vol.1
, pp. 574-582
-
-
Chin, F.1
Ösoyoglu, G.2
-
6
-
-
0018678096
-
Security in partitioned dynamic statistical databases
-
Chicago
-
F. Chin, G. Ösoyoglu, Security in partitioned dynamic statistical databases. Proceedings of IEEE COMPSAC, Chicago, 1979, pp. 594-601.
-
(1979)
Proceedings of IEEE COMPSAC
, pp. 594-601
-
-
Chin, F.1
Ösoyoglu, G.2
-
7
-
-
0004116989
-
-
McGraw-Hill, Boston
-
T. Cormen, C. Leiserson, R. Rivest, Introduction to Algorithms, McGraw-Hill, Boston, 1990.
-
(1990)
Introduction to Algorithms
-
-
Cormen, T.1
Leiserson, C.2
Rivest, R.3
-
8
-
-
0006500171
-
A simple procedure for controlled rounding
-
T. Dalenius, A simple procedure for controlled rounding, Statistik Tidsktift 3 (1981) 202-208.
-
(1981)
Statistik Tidsktift
, vol.3
, pp. 202-208
-
-
Dalenius, T.1
-
9
-
-
0018444418
-
Secure databases: Protection against user influence
-
D. Dobkin, A. Jones, R. Lipton, Secure databases: protection against user influence, ACM TODS 4 (1) (1979) 97-106.
-
(1979)
ACM TODS
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.2
Lipton, R.3
-
11
-
-
0022130080
-
Data distortion by probability distribution
-
C. Liew, W. Choi, C. Liew, Data distortion by probability distribution, ACM TODS 10 (3) (1985) 395-411.
-
(1985)
ACM TODS
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.1
Choi, W.2
Liew, C.3
-
12
-
-
0020125392
-
Enhancing the security of statistical databases with a question-answering system and a kernel
-
G. Ösoyoglu, F. Chin, Enhancing the security of statistical databases with a question-answering system and a kernel, IEEE SE-8 3 (1982) 223-234.
-
(1982)
IEEE SE-8
, vol.3
, pp. 223-234
-
-
Ösoyoglu, G.1
Chin, F.2
-
13
-
-
0021389555
-
Practical data swapping: The first steps
-
S. Reiss, Practical data swapping: the first steps, ACM TODS 9 (1) (1984) 20-37.
-
(1984)
ACM TODS
, vol.9
, Issue.1
, pp. 20-37
-
-
Reiss, S.1
-
14
-
-
0021310352
-
Diophantine inference from statistical aggregates on few-valued attributes
-
Los Angeles, CA.
-
N. Rowe, Diophantine inference from statistical aggregates on few-valued attributes. Proceedings of IEEE Conference on Data Engineering, Los Angeles, CA. 1984, pp. 107-110.
-
(1984)
Proceedings of IEEE Conference on Data Engineering
, pp. 107-110
-
-
Rowe, N.1
-
16
-
-
0021622802
-
The statistical security of a statistical database
-
J. Traub, Y. Yemini, H. Wozniakowksi, The statistical security of a statistical database, ACM TODS 9 (4) (1984) 672-679.
-
(1984)
ACM TODS
, vol.9
, Issue.4
, pp. 672-679
-
-
Traub, J.1
Yemini, Y.2
Wozniakowksi, H.3
|