메뉴 건너뛰기




Volumn 55, Issue 5, 2007, Pages 890-908

Stochastic protection of confidential information in databases: A hybrid of data perturbation and query restriction

Author keywords

Data perturbation; Database security; Hilbert spaces; Matroid intersection; Nonlinear least squares estimation; Query restriction; Statistical databases

Indexed keywords

DATA PERTURBATION; DATABASE SECURITY; STATISTICAL DATABASES;

EID: 38549090694     PISSN: 0030364X     EISSN: 15265463     Source Type: Journal    
DOI: 10.1287/opre.1070.0407     Document Type: Article
Times cited : (6)

References (24)
  • 4
    • 0020205885 scopus 로고
    • Auditing and inference control in statistical databases
    • Chin, F., G. Ozsoyoglu. 1982. Auditing and inference control in statistical databases. IEEE Trans. Software Engrg. SE-8(6) 574-582.
    • (1982) IEEE Trans. Software Engrg , vol.SE-8 , Issue.6 , pp. 574-582
    • Chin, F.1    Ozsoyoglu, G.2
  • 6
    • 0000082189 scopus 로고
    • Supression methodology and statistical disclosure control
    • Cox, L. H. 1980. Supression methodology and statistical disclosure control. J. Amer. Statist. Assoc. 75(370) 377-385.
    • (1980) J. Amer. Statist. Assoc , vol.75 , Issue.370 , pp. 377-385
    • Cox, L.H.1
  • 8
    • 2242464139 scopus 로고    scopus 로고
    • Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise
    • Duncan, G. T., S. Mukherjee. 2000. Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. J. Amer. Statist. Assoc. 95(451) 720-729.
    • (2000) J. Amer. Statist. Assoc , vol.95 , Issue.451 , pp. 720-729
    • Duncan, G.T.1    Mukherjee, S.2
  • 9
    • 0002861216 scopus 로고    scopus 로고
    • A Bayesian approach to data disclosure: Optimal intruder behavior for continuous data
    • Fienberg, S. E., U. E. Makov, A. P. Sanil. 1997. A Bayesian approach to data disclosure: Optimal intruder behavior for continuous data. J. Official Statist. 3(1) 75-89.
    • (1997) J. Official Statist , vol.3 , Issue.1 , pp. 75-89
    • Fienberg, S.E.1    Makov, U.E.2    Sanil, A.P.3
  • 10
    • 0008551538 scopus 로고    scopus 로고
    • Models and algorithms for the 2-dimensional cell supression problem in statistical disclosure control
    • Fischetti, M., J. J. Salazar. 1999. Models and algorithms for the 2-dimensional cell supression problem in statistical disclosure control. Math. Programming 84(2) 283-312.
    • (1999) Math. Programming , vol.84 , Issue.2 , pp. 283-312
    • Fischetti, M.1    Salazar, J.J.2
  • 11
    • 0004236492 scopus 로고    scopus 로고
    • 3rd ed. The Johns Hopkins University Press, New York
    • Golub, G. H., C. F. Van Loan. 1997. Matrix Computations, 3rd ed. The Johns Hopkins University Press, New York.
    • (1997) Matrix Computations
    • Golub, G.H.1    Van Loan, C.F.2
  • 12
    • 0000328477 scopus 로고    scopus 로고
    • Interval protection of confidential information in a database
    • Gopal, R., P. Goes, R. Garfinkel. 1998. Interval protection of confidential information in a database. J. Comput. 10(3) 309-322.
    • (1998) J. Comput , vol.10 , Issue.3 , pp. 309-322
    • Gopal, R.1    Goes, P.2    Garfinkel, R.3
  • 16
    • 0000610330 scopus 로고
    • Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach
    • Muralidhar, K., D. Batra, P. J. Kirs. 1995. Accessibility, security, and accuracy in statistical databases: The case for the multiplicative fixed data perturbation approach. Management Sci. 41(9) 1549-1564.
    • (1995) Management Sci , vol.41 , Issue.9 , pp. 1549-1564
    • Muralidhar, K.1    Batra, D.2    Kirs, P.J.3
  • 17
    • 0033207750 scopus 로고    scopus 로고
    • A general additive data perturbation method for database security
    • Muralidhar, K., R. Parsa, R. Sarathy. 1999. A general additive data perturbation method for database security. Management Sci. 45(10) 1399-1415.
    • (1999) Management Sci , vol.45 , Issue.10 , pp. 1399-1415
    • Muralidhar, K.1    Parsa, R.2    Sarathy, R.3
  • 18
    • 0035565671 scopus 로고    scopus 로고
    • An improved security requirement for data perturbation with implications for e-commerce
    • Muralidhar, K., R. Sarathy, R. Parsa. 2001. An improved security requirement for data perturbation with implications for e-commerce. Decision Sci. 32(4) 683-698.
    • (2001) Decision Sci , vol.32 , Issue.4 , pp. 683-698
    • Muralidhar, K.1    Sarathy, R.2    Parsa, R.3
  • 19
    • 0010814278 scopus 로고
    • Best algorithms for approximating the maximum of a submodular set function
    • 177-188
    • Nemhauser, G. L., L. A. Wolsey. 1978. Best algorithms for approximating the maximum of a submodular set function. Math. Oper. Res. 3(3) 177-188.
    • (1978) Math. Oper. Res , vol.3 , Issue.3
    • Nemhauser, G.L.1    Wolsey, L.A.2
  • 21
    • 0000095809 scopus 로고
    • An analysis of approximations for maximizing submodular set functions - I
    • Nemhauser, G. L., L. A. Wolsey, M. L. Fisher. 1978. An analysis of approximations for maximizing submodular set functions - I. Math. Programming 14 265-294.
    • (1978) Math. Programming , vol.14 , pp. 265-294
    • Nemhauser, G.L.1    Wolsey, L.A.2    Fisher, M.L.3
  • 22
    • 38549084973 scopus 로고    scopus 로고
    • Statistics New Zealand, Government of New Zealand
    • Statistics New Zealand. 2003. 2007 Census of Population and Dwellings - Meshblock Database Content. Government of New Zealand. http://www.stats.govt.nz/NR/rdonlyres/3C972F72-2CF2-4CAA-A7A0-015D76A72CD6/0/ mbdbcontent.xls.
    • (2003) 2007 Census of Population and Dwellings - Meshblock Database Content
  • 24
    • 0013776710 scopus 로고
    • Randomized response: A survey technique for eliminating evasive answer bias
    • Warner, S. L. 1965. Randomized response: A survey technique for eliminating evasive answer bias. J. Amer. Statist. Assoc. 60(309) 63-69.
    • (1965) J. Amer. Statist. Assoc , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.