메뉴 건너뛰기




Volumn 22, Issue , 2003, Pages 202-210

Revealing Information while Preserving Privacy

Author keywords

Data Reconstruction; Integrity and Security; Subset sums with noise

Indexed keywords

ALGORITHMS; PERTURBATION TECHNIQUES; POLYNOMIALS; PROBABILITY; PROBLEM SOLVING; RANDOM PROCESSES; SECURITY OF DATA; THEOREM PROVING;

EID: 1142275486     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/773153.773173     Document Type: Conference Paper
Times cited : (851)

References (21)
  • 1
    • 0018506338 scopus 로고
    • The effectiveness of output modification by rounding for protection of statistical databases
    • J. O. Achugbue and F. Y. Chin, The effectiveness of output modification by rounding for protection of statistical databases, INFOR 17, 3: 209-218, 1979.
    • (1979) INFOR , vol.17 , Issue.3 , pp. 209-218
    • Achugbue, J.O.1    Chin, F.Y.2
  • 2
    • 0024914229 scopus 로고
    • Security-Control Methods for Statistical Databases: A Comparative Study
    • N. R. Adam and J. C. Wortmann, Security-Control Methods for Statistical Databases: A Comparative Study, ACM Computing Surveys 21(4): 515-556 (1989).
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 5
    • 0003430191 scopus 로고    scopus 로고
    • Wiley-Interscience [John Wiley & Sons], New York, second edition
    • N. Alon and J. H. Spencer, The probabilistic method, Wiley-Interscience [John Wiley & Sons], New York, second edition, 2000.
    • (2000) The Probabilistic Method
    • Alon, N.1    Spencer, J.H.2
  • 6
    • 0019056889 scopus 로고
    • A Security Mechanism for Statistical databases
    • September
    • L. L. Beck, A security mechanism for statistical databases, ACM TODS, 5(3):316-338, September 1980.
    • (1980) ACM TODS , vol.5 , Issue.3 , pp. 316-338
    • Beck, L.L.1
  • 7
    • 0020205885 scopus 로고
    • Auditing and infrence control in statistical databases
    • April
    • F. Y. Chin and G. Ozsoyoglu, Auditing and infrence control in statistical databases, IEEE Trans. Softw. Eng., SE-8(6):113-139, April 1982.
    • (1982) IEEE Trans. Softw. Eng. , vol.SE-8 , Issue.6 , pp. 113-139
    • Chin, F.Y.1    Ozsoyoglu, G.2
  • 8
    • 0018442066 scopus 로고
    • The tracker: A threat to statistical database security
    • March
    • D. Denning, P. Denning, and M. Schwartz, The tracker: A threat to statistical database security, ACM Trans. on Database Systems, 4(1):76-96, March 1979.
    • (1979) ACM Trans. on Database Systems , vol.4 , Issue.1 , pp. 76-96
    • Denning, D.1    Denning, P.2    Schwartz, M.3
  • 9
    • 0019054751 scopus 로고
    • Secure statistical databases with random sample queries
    • September
    • D. E. Denning, Secure statistical databases with random sample queries, ACM Transactions on Database Systems, 5(3):291-315, September 1980.
    • (1980) ACM Transactions on Database Systems , vol.5 , Issue.3 , pp. 291-315
    • Denning, D.E.1
  • 12
    • 0023545076 scopus 로고
    • How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority
    • O. Goldreich, S. Micali and A. Wigderson, How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority, STOC 1987: 218-229.
    • (1987) STOC 1987 , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 15
    • 0022130080 scopus 로고
    • A data distortion by probability distribution
    • C. K. Liew, U. J. Choi, and C. J. Liew, A data distortion by probability distribution, ACM TODS, 10(3):395-411, 1985.
    • (1985) ACM TODS , vol.10 , Issue.3 , pp. 395-411
    • Liew, C.K.1    Choi, U.J.2    Liew, C.J.3
  • 17
    • 0021389555 scopus 로고
    • Practical Data Swapping: The First Steps
    • S. Reiss, Practical Data Swapping: The First Steps, ACM TODS, 9, 1, pp. 20-37, 1984.
    • (1984) ACM TODS , vol.9 , Issue.1 , pp. 20-37
    • Reiss, S.1
  • 19
    • 0031097176 scopus 로고    scopus 로고
    • Decoding of Reed Solomon Codes beyond the Error-Correction Bound
    • M. Sudan, Decoding of Reed Solomon Codes beyond the Error-Correction Bound, Journal of Complexity, 13 (1), 180-193, 1997.
    • (1997) Journal of Complexity , vol.13 , Issue.1 , pp. 180-193
    • Sudan, M.1
  • 20
    • 0021622802 scopus 로고
    • The Statistical Security of a Statistical Database
    • 11
    • J. Traub, Y. Yemini, H. Wozniakowksi, The Statistical Security of a Statistical Database, ACM TODS, 9, 4 pp. 672-679, 1984. 11
    • (1984) ACM TODS , vol.9 , Issue.4 , pp. 672-679
    • Traub, J.1    Yemini, Y.2    Wozniakowksi, H.3
  • 21
    • 0020312165 scopus 로고
    • Protocols for Secure Computations (Extended Abstract)
    • A. Yao, Protocols for Secure Computations (Extended Abstract), FOCS 1982: 160-164.
    • (1982) FOCS 1982 , pp. 160-164
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.