메뉴 건너뛰기




Volumn 8, Issue 5, 2009, Pages 331-345

Negative representations of information

Author keywords

Data representations; Immune inspired algorithms; Negative databases; Privacy information hiding

Indexed keywords

BIT-STRINGS; DATA REPRESENTATIONS; HARD PROBLEMS; IMMUNE-INSPIRED ALGORITHMS; MEMBERSHIP QUERY; NEGATIVE DATABASES; PRIVACY CONCERNS; PRIVACY INFORMATION HIDING;

EID: 70349584922     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-009-0078-1     Document Type: Article
Times cited : (31)

References (57)
  • 2
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases
    • Adam N.R., Wortman J.C.: Security-control methods for statistical databases. ACM Comput. Surv. 21(4), 515-556 (1989)
    • (1989) ACM Comput. Surv. , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortman, J.C.2
  • 3
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Symposium on Principles of Database Systems, pp. 247-255 (2001)
    • (2001) Symposium on Principles of Database Systems , pp. 247-255
    • Agrawal, D.1    Aggarwal, C.C.2
  • 5
    • 85012908743 scopus 로고
    • One-way accumulators: A decentralized alternative to digital signatures
    • Benaloh, J.C., dA Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Advances in Cryptology - EUROCRYPT '93, pp. 274-285 (1994). http://citeseer.nj.nec.com/article/ benaloh93oneway.html
    • (1994) Advances in Cryptology - EUROCRYPT '93 , pp. 274-285
    • Benaloh, J.C.1    de Mare, M.2
  • 6
  • 7
    • 84949995981 scopus 로고
    • An efficient probabilistic public-key encryption scheme which hides all partial information
    • In: Blakely, G.R., Chaum, D. (eds.) Springer, Berlin
    • Blum, M., Goldwasser, S.: An efficient probabilistic public-key encryption scheme which hides all partial information. In: Blakely, G.R., Chaum, D. (eds.) Advances in Cryptology: Proceedings of CRYPTO 84. Lecture Notes in Computer Science, vol. 196, pp. 289-302. Springer, Berlin (1985)
    • (1985) Advances in Cryptology: Proceedings of CRYPTO 84. Lecture Notes in Computer Science , vol.196 , pp. 289-302
    • Blum, M.1    Goldwasser, S.2
  • 8
    • 0018443657 scopus 로고
    • A note on the complexity of cryptography
    • Brassard G.: A note on the complexity of cryptography. IEEE Trans. Inform. Theory 25(2), 232-233 (1979)
    • (1979) IEEE Trans. Inform. Theory , vol.25 , Issue.2 , pp. 232-233
    • Brassard, G.1
  • 10
    • 0026913667 scopus 로고
    • Symbolic Boolean manipulation with ordered binary-decision diagrams
    • Bryant R.E. (1992) Symbolic Boolean manipulation with ordered binary-decision diagrams. ACM Comput. Surv. 24(3), 293-318 (1992). http:/ /citeseer.nj.nec.com/bryant92symbolic.html
    • (1992) ACM Comput. Surv. , vol.24 , Issue.3 , pp. 293-318
    • Bryant, R.E.1
  • 11
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • In: Yung, M. (ed.) International Association for Cryptologic Research, Springer, Germany
    • Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) Advances in Cryptology - CRYPTO '2002, Lecture Notes in Computer Science, vol. 2442, pp. 61-76. International Association for Cryptologic Research, Springer, Germany (2002). http://www.springerlink.com/ link.asp?id=yklb7xdvbbc0wwgy
    • (2002) Advances in Cryptology - CRYPTO '2002, Lecture Notes in Computer Science , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 12
    • 0022754707 scopus 로고
    • Security problems on inference control for sum, max, and min queries
    • doi: 10.1145/5925.5928
    • Chin F.: Security problems on inference control for sum, max, and min queries. J. ACM 33(3), 451-464 (1986). doi: 10.1145/5925.5928
    • (1986) J. ACM , vol.33 , Issue.3 , pp. 451-464
    • Chin, F.1
  • 14
    • 0027708548 scopus 로고
    • Experimental results on the crossover point in satisfiability problems
    • In: Fikes, R., Lehnert, W. (eds) American Association for Artificial Intelligence, AAAI Press, Menlo Park
    • Crawford J.M., Anton L.D.: Experimental results on the crossover point in satisfiability problems. In: Fikes, R., Lehnert, W. (eds) Proceedings of the Eleventh National Conference on Artificial Intelligence, pp. 21-27. American Association for Artificial Intelligence, AAAI Press, Menlo Park (1993)
    • (1993) Proceedings of the Eleventh National Conference on Artificial Intelligence , pp. 21-27
    • Crawford, J.M.1    Anton, L.D.2
  • 17
    • 0020779363 scopus 로고
    • Inference controls for statistical databases
    • Denning D., Schlorer J.: Inference controls for statistical databases. Computer 16(7), 69-82 (1983)
    • (1983) Computer , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.1    Schlorer, J.2
  • 19
    • 0018444418 scopus 로고
    • Secure databases: Protection against user influence
    • Dobkin D., JPnes A., Lipton R.: Secure databases: protection against user influence. ACM Trans. Database Syst. 4(1), 97-106 (1979)
    • (1979) ACM Trans. Database Syst. , vol.4 , Issue.1 , pp. 97-106
    • Dobkin, D.1    Jones, A.2    Lipton, R.3
  • 24
    • 35348817340 scopus 로고    scopus 로고
    • Protecting data privacy through hard-to-reverse negative databases
    • Esponda F., Forrest S., Helman P.: Protecting data privacy through hard-to-reverse negative databases. Int. J. Inform. Security 6 (6), 403-415 (2007)
    • (2007) Int. J. Inform. Security , vol.6 , Issue.6 , pp. 403-415
    • Esponda, F.1    Forrest, S.2    Helman, P.3
  • 28
    • 33646492430 scopus 로고
    • Cryptographic protection of databases and software
    • In: American Mathematical Society, Providence
    • Feigenbaum, J., Liberman, M.Y., Wright, R.N.: Cryptographic protection of databases and software. In: Distributed Computing and Cryptography, pp. 161-172. American Mathematical Society, Providence (1991)
    • (1991) Distributed Computing and Cryptography , pp. 161-172
    • Feigenbaum, J.1    Liberman, M.Y.2    Wright, R.N.3
  • 29
    • 0042514966 scopus 로고    scopus 로고
    • How to fake an RSA signature by encoding modular root finding as a SAT problem
    • Fiorini C., Martinelli E., Massacci F.: How to fake an RSA signature by encoding modular root finding as a SAT problem. Discrete Appl. Math. 130 (2), 101-127 (2003)
    • (2003) Discrete Appl. Math. , vol.130 , Issue.2 , pp. 101-127
    • Fiorini, C.1    Martinelli, E.2    Massacci, F.3
  • 30
    • 0021444827 scopus 로고
    • Logic and databases: A deductive approach
    • Gallaire H., MiAker J., Nicolas J.: Logic and databases: a deductive approach. Comput. Surv. 16(2), 154-185 (1984)
    • (1984) Comput. Surv. , vol.16 , Issue.2 , pp. 154-185
    • Gallaire, H.1    Minker, J.2    Nicolas, J.3
  • 33
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • See also preliminary version in 14th STOC, 1982
    • Goldwasser S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2):270-299 (1984). See also preliminary version in 14th STOC, 1982
    • (1984) J. Comput. Syst. Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 35
    • 0024768555 scopus 로고
    • Efficient cryptographic schemes provably as secure as subset sum
    • In: IEEE (ed.) October 30-November 1, 1989, Research Triangle Park, NC IEEE Computer Society Press, USA
    • Impagliazzo, R., Naor, M.: Efficient cryptographic schemes provably as secure as subset sum. In: IEEE (ed.) 30th annual Symposium on Foundations of Computer Science, October 30-November 1, 1989, Research Triangle Park, NC, pp. 236-241. IEEE Computer Society Press, USA (1989)
    • (1989) 30th Annual Symposium on Foundations of Computer Science , pp. 236-241
    • Impagliazzo, R.1    Naor, M.2
  • 36
    • 33750271288 scopus 로고    scopus 로고
    • Generating hard satisfiable formulas by hiding solutions deceptively
    • Jia, H., Moore, C., Strain, D.: Generating hard satisfiable formulas by hiding solutions deceptively. In: AAAI (2005)
    • (2005) AAAI
    • Jia, H.1    Moore, C.2    Strain, D.3
  • 37
    • 0000718899 scopus 로고
    • The map method for synthesis of combinational logic circuits
    • Karnaugh, M.: The map method for synthesis of combinational logic circuits. Trans. AIEE, pp. 593-598 (1953)
    • (1953) Trans. AIEE , pp. 593-598
    • Karnaugh, M.1
  • 41
    • 33750232780 scopus 로고
    • Inference control via query restriction vs. data modification: A perspective
    • In: North-Holland Publishing Co., Amsterdam
    • Matloff, N.S.: Inference control via query restriction vs. data modification: A perspective. In: On Database Security: Status and Prospects, pp. 159-166. North-Holland Publishing Co., Amsterdam (1988)
    • (1988) On Database Security: Status and Prospects , pp. 159-166
    • Matloff, N.S.1
  • 42
  • 43
    • 0018019325 scopus 로고
    • Hiding information and signatures in trapdoor knapsacks
    • Merkle R.C., Hellman M.E.: Hiding information and signatures in trapdoor knapsacks. IEEE Trans. Inf. Theory 24(5), 525-530 (1978)
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.5 , pp. 525-530
    • Merkle, R.C.1    Hellman, M.E.2
  • 47
    • 0029711243 scopus 로고    scopus 로고
    • Evaluation may be easier than generation (extended abstract)
    • In: ACM Press, New York doi: 10.1145/237814.237833
    • Naor, M.: Evaluation may be easier than generation (extended abstract). In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of computing, pp. 74-83. ACM Press, New York (1996). doi: 10.1145/ 237814.237833
    • (1996) Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing , pp. 74-83
    • Naor, M.1
  • 48
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • In: Seattle, Washington, May 15-17 ACM Press, New York (1989)
    • Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, Seattle, Washington, May 15-17, 1989, pp. 33-43. ACM Press, New York (1989)
    • (1989) Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 51
  • 54
    • 0028393221 scopus 로고
    • A modified random perturbation method for database security
    • doi: 10.1145/174638.174641
    • Tendick P., Matloff N.: A modified random perturbation method for database security. ACM Trans. Database Syst. 19(1), 47-63 (1994). doi: 10.1145/174638.174641
    • (1994) ACM Trans. Database Syst. , vol.19 , Issue.1 , pp. 47-63
    • Tendick, P.1    Matloff, N.2
  • 55
    • 70349590717 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • (to appear)
    • Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Security (2004, to appear)
    • (2004) J. Comput. Security
    • Vaidya, J.1    Clifton, C.2
  • 57
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • In: IEEE (ed.) November 3-5 Chicago, IL IEEE Computer Society Press, USA (1982)
    • Yao, A.: Protocols for secure computations. In: IEEE (ed.) 23rd annual Symposium on Foundations of Computer Science, November 3-5, 1982, Chicago, IL, pp. 160-164. IEEE Computer Society Press, USA (1982)
    • (1982) 23rd Annual Symposium on Foundations of Computer Science , pp. 160-164
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.