Functional dependencies and their connection with security of statistical databases
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. Memoryless Inference Controls for Statistical Databases , 1982, 1982 IEEE Symposium on Security and Privacy.
[2] Zbigniew Michalewicz. Compromisability of a statistical database , 1981, Inf. Syst..
[3] Reind P. van de Riet,et al. Answering queries without revealing secrets , 1983, TODS.
[4] Dorothy E. Denning,et al. A fast procedure for finding a tracker in a statistical database , 1980, TODS.
[5] L. Cox. Suppression Methodology and Statistical Disclosure Control , 1980 .
[6] Zbigniew Michalewicz. Statistical Databases: Their Model, Query Language and Security , 1983, SSDBM.
[7] Jeffrey D. Ullman,et al. Principles of Database Systems , 1980 .
[8] Z. Meral Ozsoyoglu,et al. Update handling techniques in statistical databases , 1981 .
[9] Richard J. Lipton,et al. Even Data Bases That Lie Can Be Compromised , 1978, IEEE Transactions on Software Engineering.
[10] Jan van Leeuwen. On Compromising Statistical Data-Bases with a few Known Elements , 1979, Inf. Process. Lett..
[11] Dorothy E. Denning,et al. Inference Controls for Statistical Databases , 1983, Computer.
[12] Richard J. Lipton,et al. Secure databases: protection against user influence , 1979, TODS.
[13] Wiebren de Jonge,et al. Compromising statistical databases responding to queries about means , 1983, TODS.
[14] Jeffrey D. Ullman,et al. A model of statistical database their security , 1977, TODS.
[15] J. Schlörer. Confidentiality of Statistical Records: A Threat-Monitoring Scheme for On Line Dialogue , 1976, Methods of Information in Medicine.
[16] Gultekin Özsoyoglu,et al. Statistical database design , 1981, TODS.
[17] Dorothy E. Denning,et al. Secure statistical databases with random sample queries , 1980, TODS.
[18] Gultekin Özsoyoglu,et al. Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design , 1982, IEEE Transactions on Software Engineering.
[19] J. Schlörer. Identification and Retrieval of Personal Records from a Statistical Data Bank , 1975, Methods of Information in Medicine.
[20] David L. Wells,et al. Database Security , 1978, IEEE Transactions on Software Engineering.
[21] Jan Schlörer,et al. Security of statistical databases: multidimensional transformation , 1980, TODS.
[22] Leland L. Beck,et al. A security machanism for statistical database , 1980, TODS.
[23] Peter J. Denning,et al. The tracker: a threat to statistical database security , 1979, TODS.
[24] Dorothy E. Denning,et al. A Security Model for the Statistical Database Problem , 1983, SSDBM.
[25] Peter J. Denning,et al. Linear queries in statistical databases , 1979, ACM Trans. Database Syst..
[26] Zbigniew Michalewicz. Inference control in statistical databases with incomplete information , 1983, Inf. Syst..
[27] Francis Y. L. Chin. Security in statistical databases for queries with small counts , 1978, TODS.
[28] Andrew Chi-Chih Yao. A Note on a Conjecture of Kam and Ullman Concerning Statistical Databases , 1979, Inf. Process. Lett..