Statistical Databases: Their Model, Query Language and Security
暂无分享,去创建一个
[1] Richard J. Lipton,et al. Even Data Bases That Lie Can Be Compromised , 1978, IEEE Transactions on Software Engineering.
[2] Jan van Leeuwen. On Compromising Statistical Data-Bases with a few Known Elements , 1979, Inf. Process. Lett..
[3] Richard J. Lipton,et al. Secure databases: protection against user influence , 1979, TODS.
[4] Dorothy E. Denning,et al. Memoryless Inference Controls for Statistical Databases , 1982, 1982 IEEE Symposium on Security and Privacy.
[5] Jeffrey D. Ullman,et al. Principles of Database Systems , 1980 .
[6] David K. Hsiao,et al. A Semantic Model for Data Base Protection Languages , 1976, VLDB.
[7] Peter J. Denning,et al. Linear queries in statistical databases , 1979, ACM Trans. Database Syst..
[8] Clement T. Yu,et al. A study on the protection of statistical data bases , 1977, SIGMOD '77.
[9] Peter J. Denning,et al. Data Security , 1979, CSUR.
[10] Victor W. Marek,et al. Information Storage and Retrieval Systems: Mathematical Foundations , 1976, Theor. Comput. Sci..
[11] David K. Hsiao,et al. Information Secure Systems , 1976, Adv. Comput..
[12] Francis Y. L. Chin,et al. Efficient Inference Control for Range SUM Queries , 1984, Theor. Comput. Sci..
[13] Dorothy E. Denning,et al. Secure statistical databases with random sample queries , 1980, TODS.
[14] Gultekin Özsoyoglu,et al. Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design , 1982, IEEE Transactions on Software Engineering.
[15] David L. Wells,et al. Database Security , 1978, IEEE Transactions on Software Engineering.
[16] Jan Schlörer,et al. Security of statistical databases: multidimensional transformation , 1980, TODS.
[17] Gultekin Özsoyoglu,et al. Statistical database design , 1981, TODS.
[18] Zbigniew Michalewicz. Compromisability of a statistical database , 1981, Inf. Syst..
[19] Jeffrey D. Ullman,et al. A model of statistical database their security , 1977, TODS.
[20] Leland L. Beck,et al. A security machanism for statistical database , 1980, TODS.
[21] Peter J. Denning,et al. The tracker: a threat to statistical database security , 1979, TODS.
[22] Eugene Wong,et al. A statistical approach to incomplete information in database systems , 1982, TODS.
[23] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[24] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[25] E. F. Codd,et al. A relational model of data for large shared data banks , 1970, CACM.
[26] Dorothy E. Denning,et al. A fast procedure for finding a tracker in a statistical database , 1980, TODS.
[27] Witold Lipski,et al. On semantic issues connected with incomplete information databases , 1979, ACM Trans. Database Syst..
[28] E. F. Codd,et al. Extending the database relational model to capture more meaning , 1979, ACM Trans. Database Syst..
[29] Victor W. Marek,et al. Information systems: on queries involving cardinalities , 1979, Inf. Syst..
[30] Zbigniew Michalewicz. Inference control in statistical databases with incomplete information , 1983, Inf. Syst..
[31] Francis Y. L. Chin. Security in statistical databases for queries with small counts , 1978, TODS.
[32] Andrew Chi-Chih Yao. A Note on a Conjecture of Kam and Ullman Concerning Statistical Databases , 1979, Inf. Process. Lett..