메뉴 건너뛰기




Volumn , Issue , 2006, Pages 163-172

On the efficiency of checking perfect privacy

Author keywords

[No Author keywords available]

Indexed keywords

CONJUNCTIVE QUERIES; PRIVACY-PRESERVING; QUERY CONTAINMENT;

EID: 34250669245     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1142351.1142375     Document Type: Conference Paper
Times cited : (42)

References (25)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. R. Adam and J. C. Wortmann. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv., 21(4):515-556, 1989.
    • (1989) ACM Comput. Surv , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 3
    • 0040884892 scopus 로고    scopus 로고
    • A flexible authorization mechanism for relational data management systems
    • E. Bertino, S. Jajodia, and P. Samarati. A flexible authorization mechanism for relational data management systems. ACM Trans. Inf. Syst., 1999.
    • (1999) ACM Trans. Inf. Syst
    • Bertino, E.1    Jajodia, S.2    Samarati, P.3
  • 5
    • 84958776545 scopus 로고
    • Optimal implementation of conjunctive queries in relational databases
    • A. K. Chandra and P. M. Merlin. Optimal implementation of conjunctive queries in relational databases. In STOC, 1977.
    • (1977) STOC
    • Chandra, A.K.1    Merlin, P.M.2
  • 6
    • 34250630317 scopus 로고    scopus 로고
    • S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In TCC, 2005.
    • S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In TCC, 2005.
  • 7
    • 0002766663 scopus 로고    scopus 로고
    • Conjunctive query containment revisited
    • C. Chekuri and A. Rajaraman. Conjunctive query containment revisited. In ICDT, 1997.
    • (1997) ICDT
    • Chekuri, C.1    Rajaraman, A.2
  • 8
    • 33745627370 scopus 로고    scopus 로고
    • Asymptotic conditional probabilities for conjunctive queries
    • N. Dalvi, G. Miklau, and D. Suciu. Asymptotic conditional probabilities for conjunctive queries. In ICDT, 2005.
    • (2005) ICDT
    • Dalvi, N.1    Miklau, G.2    Suciu, D.3
  • 11
    • 0034515087 scopus 로고    scopus 로고
    • A comparison of structural csp decomposition methods
    • G. Gottlob, N. Leone, and F. Scarcello. A comparison of structural csp decomposition methods. Artif. Intell., 2000.
    • (2000) Artif. Intell
    • Gottlob, G.1    Leone, N.2    Scarcello, F.3
  • 12
    • 84976657250 scopus 로고
    • An authorization mechanism for a relational database system
    • P. P. Griffiths and B. W. Wade. An authorization mechanism for a relational database system. ACM Trans. Database Syst., 1(3), 1976.
    • (1976) ACM Trans. Database Syst , vol.1 , Issue.3
    • Griffiths, P.P.1    Wade, B.W.2
  • 14
    • 0023827554 scopus 로고
    • On conjunctive queries containing inequalities
    • A. Klug. On conjunctive queries containing inequalities. Journal of the ACM, 35(1):146-160, 1988.
    • (1988) Journal of the ACM , vol.35 , Issue.1 , pp. 146-160
    • Klug, A.1
  • 15
    • 0031632775 scopus 로고    scopus 로고
    • On the complexity of the containment problem for conjunctive queries with built-in predicates
    • P. Kolaitis, D. L. Martin, and M. N. Thakur. On the complexity of the containment problem for conjunctive queries with built-in predicates. In PODS, 1998.
    • (1998) PODS
    • Kolaitis, P.1    Martin, D.L.2    Thakur, M.N.3
  • 16
    • 0031618504 scopus 로고    scopus 로고
    • Conjunctive-query containment and constraint satisfaction
    • P. Kolaitis and M. Vardi. Conjunctive-query containment and constraint satisfaction. In PODS, 1998.
    • (1998) PODS
    • Kolaitis, P.1    Vardi, M.2
  • 18
    • 3142686877 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, 2004.
    • (2004) SIGMOD
    • Miklau, G.1    Suciu, D.2
  • 19
    • 0029733086 scopus 로고    scopus 로고
    • Query folding
    • X. Qian. Query folding. In ICDE, 1996.
    • (1996) ICDE
    • Qian, X.1
  • 20
    • 0025406342 scopus 로고
    • Polynomial-time program transformations in deductive databases
    • Y. P. Saraiya. Polynomial-time program transformations in deductive databases. In PODS, 1990.
    • (1990) PODS
    • Saraiya, Y.P.1
  • 21
    • 34250616132 scopus 로고    scopus 로고
    • Provable data privacy
    • K. Stoffel and M. Studer. Provable data privacy. In DEXA, 2005.
    • (2005) DEXA
    • Stoffel, K.1    Studer, M.2
  • 22
    • 0036811662 scopus 로고    scopus 로고
    • k-anonymity: A model for protecting privacy
    • L. Sweeney. k-anonymity: a model for protecting privacy. IJUFKS, 10(5):557-570, 2002.
    • (2002) IJUFKS , vol.10 , Issue.5 , pp. 557-570
    • Sweeney, L.1
  • 23
    • 0031078498 scopus 로고    scopus 로고
    • The complexity of querying indefinite data about linearly ordered domains
    • R. van der Meyden. The complexity of querying indefinite data about linearly ordered domains. JCSS, 54(1), 1997.
    • (1997) JCSS , vol.54 , Issue.1
    • van der Meyden, R.1
  • 24
    • 0019714095 scopus 로고
    • Algorithms for acyclic database schemes
    • M. Yannakakis. Algorithms for acyclic database schemes. In VLDB, 1981.
    • (1981) VLDB
    • Yannakakis, M.1
  • 25
    • 0018739062 scopus 로고
    • An algorithm for tree-query membership of a distributed query
    • C. T. Yu and M. Z. Ozsoyoglu. An algorithm for tree-query membership of a distributed query. In IEEE COMPSAC, 1979.
    • (1979) IEEE COMPSAC
    • Yu, C.T.1    Ozsoyoglu, M.Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.