-
1
-
-
0013379607
-
A multi-proportions randomized response model
-
A. L. Abul-Ela, B.G. Greenberg, and D.G. Horvitz. A multi-proportions randomized response model. Journal of American Statistical Association, 62(319): 990-1008, 1967.
-
(1967)
Journal of American Statistical Association
, vol.62
, Issue.319
, pp. 990-1008
-
-
Abul-Ela, A.L.1
Greenberg, B.G.2
Horvitz, D.G.3
-
2
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N.R. Adam and J.C. Wortmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21(4): 515-556, 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
3
-
-
0018051976
-
Are statistical data bases secure?
-
D.E. Denning. Are statistical data bases secure? In AFIPS conference proceedings, volume 47, pages 199-204, 1978.
-
(1978)
AFIPS conference proceedings
, vol.47
, pp. 199-204
-
-
Denning, D.E.1
-
5
-
-
0020779363
-
Inference controls for statistical databases
-
D.E. Denning and J. Schlörer. Inference controls for statistical databases. IEEE Computer, 16(7): 69-82, 1983.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.E.1
Schlörer, J.2
-
6
-
-
84858614119
-
-
Optimization Technology Center of Northwestern University and Argonne National Laboratory
-
R. Fourer. Linear programming frequently asked questions. Optimization Technology Center of Northwestern University and Argonne National Laboratory, 2001. http://www-unix.mcs.anl.gov/otc/Guide/faq/linear-programming-faq.html.
-
(2001)
Linear programming frequently asked questions
-
-
Fourer, R.1
-
8
-
-
0346396080
-
Security of random data perturbation methods
-
K. Muralidhar and R. Sarathy. Security of random data perturbation methods. ACM Trans. on Database Systems, 24(4): 487-493, 1999.
-
(1999)
ACM Trans. on Database Systems
, vol.24
, Issue.4
, pp. 487-493
-
-
Muralidhar, K.1
Sarathy, R.2
-
9
-
-
0022583507
-
Security of statistical databases compromise through attribute correlational modeling
-
M.A. Palley. Security of statistical databases compromise through attribute correlational modeling. In Proc. of IEEE Conference on Data Engineering, pages 67-74, 1986.
-
(1986)
Proc. of IEEE Conference on Data Engineering
, pp. 67-74
-
-
Palley, M.A.1
-
10
-
-
0028393221
-
A modified random perturbation method for database security
-
P. Tendick and N. Matloff. A modified random perturbation method for database security. ACM Trans. on Database Systems, 19(1): 47-63, 1994.
-
(1994)
ACM Trans. on Database Systems
, vol.19
, Issue.1
, pp. 47-63
-
-
Tendick, P.1
Matloff, N.2
-
11
-
-
0021622802
-
The statistical security of a statistical database
-
J.F. Traub, Y. Yemini, and H. Woźniakowski. The statistical security of a statistical database. ACM Trans. on Database Systems, 9(4): 672-679, 1984.
-
(1984)
ACM Trans. on Database Systems
, vol.9
, Issue.4
, pp. 672-679
-
-
Traub, J.F.1
Yemini, Y.2
Woźniakowski, H.3
-
12
-
-
0013776710
-
A survey technique for eliminating evasive answer bias
-
S.L. Warner. A survey technique for eliminating evasive answer bias. Journal of American Statistical Association, 60(309): 63-69, 1965.
-
(1965)
Journal of American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
|