메뉴 건너뛰기




Volumn 4176 LNCS, Issue , 2006, Pages 72-84

Protecting data privacy through hard-to-reverse negative databases

Author keywords

[No Author keywords available]

Indexed keywords

DATA ACQUISITION; DATABASE SYSTEMS; IMAGE ANALYSIS; IMAGE COMPRESSION; INFORMATION TECHNOLOGY;

EID: 33750273651     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11836810_6     Document Type: Conference Paper
Times cited : (12)

References (41)
  • 2
    • 84886023553 scopus 로고    scopus 로고
    • Generating satisfiable problem instances
    • Menlo Park, CA, July 30- 3 AAAI Press
    • D. Achlioptas, C. Gomes, H. Kautz, and B. Selman. Generating satisfiable problem instances. In Proceedings of AAAI-00 and IAAI-00, pages 256-261, Menlo Park, CA, July 30- 3 2000. AAAI Press.
    • (2000) Proceedings of AAAI-00 and IAAI-00 , pp. 256-261
    • Achlioptas, D.1    Gomes, C.2    Kautz, H.3    Selman, B.4
  • 4
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases
    • December
    • N. R. Adam and J. C. Wortman. Security-control methods for statistical databases. ACM Computing Surveys, 21(4):515-556, December 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortman, J.C.2
  • 5
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Symposium on Principles of Database Systems, pages 247-255, 2001.
    • (2001) Symposium on Principles of Database Systems , pp. 247-255
    • Agrawal, D.1    Aggarwal, C.C.2
  • 7
    • 85012908743 scopus 로고
    • One-way accumulators: A decentralized alternative to digital signatures
    • J. Cohen Benaloh and M. de Mare. One-way accumulators: A decentralized alternative to digital signatures. In Advances in Cryptology - EUROCRYPT '93, pages 274-285, 1994.
    • (1994) Advances in Cryptology - EUROCRYPT '93 , pp. 274-285
    • Benaloh, J.C.1    De Mare, M.2
  • 8
  • 9
    • 84949995981 scopus 로고
    • An efficient probabilistic public-key encryption scheme which hides all partial information
    • George Robert Blakely and David Chaum, editors, Advances in Cryptology: proceedings of CRYPTO 84, Berlin, Germany / Heidelberg, Germany / London, UK / etc., Springer-Verlag
    • M. Blum and S. Goldwasser. An efficient probabilistic public-key encryption scheme which hides all partial information. In George Robert Blakely and David Chaum, editors, Advances in Cryptology: proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, pages 289-302, Berlin, Germany / Heidelberg, Germany / London, UK / etc., 1985. Springer-Verlag.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 289-302
    • Blum, M.1    Goldwasser, S.2
  • 10
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • Moti Yung, editor, Advances in Cryptology - CRYPTO ' 2002, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
    • J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Moti Yung, editor, Advances in Cryptology - CRYPTO ' 2002, volume 2442 of Lecture Notes in Computer Science, pages 61-76. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 11
    • 0022754707 scopus 로고
    • Security problems on inference control for sum, max, and min queries
    • F. Chin. Security problems on inference control for sum, max, and min queries. J. ACM, 33(3):451-464, 1986.
    • (1986) J. ACM , vol.33 , Issue.3 , pp. 451-464
    • Chin, F.1
  • 12
    • 0004356882 scopus 로고    scopus 로고
    • Finding hard instances of the satisfiability problem: A survey
    • Du, Gu, and Pardalos, editors, Satisfiability Problem: Theory and Applications, American Mathematical Society
    • S. A. Cook and D. G. Mitchell. Finding hard instances of the satisfiability problem: A survey. In Du, Gu, and Pardalos, editors, Satisfiability Problem: Theory and Applications, volume 35 of Dimacs Series in Discrete Mathematics and Theoretical Computer Science, pages 1-17. American Mathematical Society, 1997.
    • (1997) Dimacs Series in Discrete Mathematics and Theoretical Computer Science , vol.35 , pp. 1-17
    • Cook, S.A.1    Mitchell, D.G.2
  • 14
    • 0020779363 scopus 로고
    • Inference controls for statistical databases
    • July
    • D.E. Denning and J. Schlorer. Inference controls for statistical databases. Computer, 16(7):69-82, July 1983.
    • (1983) Computer , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.E.1    Schlorer, J.2
  • 15
  • 24
    • 0042514966 scopus 로고    scopus 로고
    • How to fake an RSA signature by encoding modular root finding as a SAT problem
    • C. Fiorini, E. Martinelli, and F. Massacci. How to fake an RSA signature by encoding modular root finding as a SAT problem. Discrete Appl. Math., 130(2):101-127, 2003.
    • (2003) Discrete Appl. Math. , vol.130 , Issue.2 , pp. 101-127
    • Fiorini, C.1    Martinelli, E.2    Massacci, F.3
  • 30
    • 33750271288 scopus 로고    scopus 로고
    • Generating hard satisfiable formulas by hiding solutions deceptively
    • H. Jia, C. Moore, and D. Strain. Generating hard satisfiable formulas by hiding solutions deceptively. In AAAI, 2005.
    • (2005) AAAI
    • Jia, H.1    Moore, C.2    Strain, D.3
  • 32
    • 33750232780 scopus 로고
    • Inference control via query restriction vs. data modification: A perspective
    • North-Holland Publishing Co.
    • N. S. Matloff. Inference control via query restriction vs. data modification: a perspective. In on Database Security: Status and Prospects, pages 159-166. North-Holland Publishing Co., 1988.
    • (1988) On Database Security: Status and Prospects , pp. 159-166
    • Matloff, N.S.1
  • 35
    • 0027002161 scopus 로고
    • Problem solving: Hardness and easiness - Hard and easy distributions of SAT problems
    • AAAI Press, Menlo Park, California, USA
    • D. Mitchell, B. Selman, and H. Levesque. Problem solving: Hardness and easiness - hard and easy distributions of SAT problems. In Proceeding of (AAAI-92), pages 459-465. AAAI Press, Menlo Park, California, USA, 1992.
    • (1992) Proceeding of (AAAI-92) , pp. 459-465
    • Mitchell, D.1    Selman, B.2    Levesque, H.3
  • 37
    • 0002114928 scopus 로고
    • The rise and fall of knapsack cryptosystems
    • Carl Pomerance and S. Goldwasser, editors, Cryptology and Computational Number Theory, pub-AMS
    • A. M. Odlyzko. The rise and fall of knapsack cryptosystems. In Carl Pomerance and S. Goldwasser, editors, Cryptology and Computational Number Theory, volume 42 of Proceedings of symposia in applied mathematics. AMS short course lecture notes, pages 75-88. pub-AMS, 1990.
    • (1990) Proceedings of Symposia in Applied Mathematics. AMS Short Course Lecture Notes , vol.42 , pp. 75-88
    • Odlyzko, A.M.1
  • 40
    • 0028393221 scopus 로고
    • A modified random perturbation method for database security
    • P. Tendick and N. Matloff. A modified random perturbation method for database security. ACM Trans. Database Syst., 19(1):47-63, 1994.
    • (1994) ACM Trans. Database Syst. , vol.19 , Issue.1 , pp. 47-63
    • Tendick, P.1    Matloff, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.