메뉴 건너뛰기




Volumn 2482, Issue , 2003, Pages 160-170

Preventing interval-based inference by random data perturbation*

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTERS;

EID: 84957800404     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36467-6_12     Document Type: Conference Paper
Times cited : (6)

References (12)
  • 2
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N.R. Adam and J.C. Wortmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21(4): 515-556, 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 3
    • 0018051976 scopus 로고
    • Are statistical data bases secure?
    • D.E. Denning. Are statistical data bases secure? In AFIPS conference proceedings, volume 47, pages 199-204, 1978.
    • (1978) AFIPS conference proceedings , vol.47 , pp. 199-204
    • Denning, D.E.1
  • 5
    • 0020779363 scopus 로고
    • Inference controls for statistical databases
    • D.E. Denning and J. Schlörer. Inference controls for statistical databases. IEEE Computer, 16(7): 69-82, 1983.
    • (1983) IEEE Computer , vol.16 , Issue.7 , pp. 69-82
    • Denning, D.E.1    Schlörer, J.2
  • 6
    • 84858614119 scopus 로고    scopus 로고
    • Optimization Technology Center of Northwestern University and Argonne National Laboratory
    • R. Fourer. Linear programming frequently asked questions. Optimization Technology Center of Northwestern University and Argonne National Laboratory, 2001. http://www-unix.mcs.anl.gov/otc/Guide/faq/linear-programming-faq.html.
    • (2001) Linear programming frequently asked questions
    • Fourer, R.1
  • 8
    • 0346396080 scopus 로고    scopus 로고
    • Security of random data perturbation methods
    • K. Muralidhar and R. Sarathy. Security of random data perturbation methods. ACM Trans. on Database Systems, 24(4): 487-493, 1999.
    • (1999) ACM Trans. on Database Systems , vol.24 , Issue.4 , pp. 487-493
    • Muralidhar, K.1    Sarathy, R.2
  • 9
    • 0022583507 scopus 로고
    • Security of statistical databases compromise through attribute correlational modeling
    • M.A. Palley. Security of statistical databases compromise through attribute correlational modeling. In Proc. of IEEE Conference on Data Engineering, pages 67-74, 1986.
    • (1986) Proc. of IEEE Conference on Data Engineering , pp. 67-74
    • Palley, M.A.1
  • 10
    • 0028393221 scopus 로고
    • A modified random perturbation method for database security
    • P. Tendick and N. Matloff. A modified random perturbation method for database security. ACM Trans. on Database Systems, 19(1): 47-63, 1994.
    • (1994) ACM Trans. on Database Systems , vol.19 , Issue.1 , pp. 47-63
    • Tendick, P.1    Matloff, N.2
  • 12
    • 0013776710 scopus 로고
    • A survey technique for eliminating evasive answer bias
    • S.L. Warner. A survey technique for eliminating evasive answer bias. Journal of American Statistical Association, 60(309): 63-69, 1965.
    • (1965) Journal of American Statistical Association , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.