Statistical Databases: Their Model, Query Language and Security

In this paper we deal with the problem of security of statistical databases, i.e. file systems. We propose a model of a statistical database in which to investigate the properties of statistical databases and we describe a query language connected with such a database. We discuss the problem of dependencies between attributes and we consider the case when database contains incomplete information. In the case of incomolete information the problems arrive with the interpretation of the query language, mainly for statistical terms. The need for a orecise semantic is here evident.

[1]  Richard J. Lipton,et al.  Even Data Bases That Lie Can Be Compromised , 1978, IEEE Transactions on Software Engineering.

[2]  Jan van Leeuwen On Compromising Statistical Data-Bases with a few Known Elements , 1979, Inf. Process. Lett..

[3]  Richard J. Lipton,et al.  Secure databases: protection against user influence , 1979, TODS.

[4]  Dorothy E. Denning,et al.  Memoryless Inference Controls for Statistical Databases , 1982, 1982 IEEE Symposium on Security and Privacy.

[5]  Jeffrey D. Ullman,et al.  Principles of Database Systems , 1980 .

[6]  David K. Hsiao,et al.  A Semantic Model for Data Base Protection Languages , 1976, VLDB.

[7]  Peter J. Denning,et al.  Linear queries in statistical databases , 1979, ACM Trans. Database Syst..

[8]  Clement T. Yu,et al.  A study on the protection of statistical data bases , 1977, SIGMOD '77.

[9]  Peter J. Denning,et al.  Data Security , 1979, CSUR.

[10]  Victor W. Marek,et al.  Information Storage and Retrieval Systems: Mathematical Foundations , 1976, Theor. Comput. Sci..

[11]  David K. Hsiao,et al.  Information Secure Systems , 1976, Adv. Comput..

[12]  Francis Y. L. Chin,et al.  Efficient Inference Control for Range SUM Queries , 1984, Theor. Comput. Sci..

[13]  Dorothy E. Denning,et al.  Secure statistical databases with random sample queries , 1980, TODS.

[14]  Gultekin Özsoyoglu,et al.  Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design , 1982, IEEE Transactions on Software Engineering.

[15]  David L. Wells,et al.  Database Security , 1978, IEEE Transactions on Software Engineering.

[16]  Jan Schlörer,et al.  Security of statistical databases: multidimensional transformation , 1980, TODS.

[17]  Gultekin Özsoyoglu,et al.  Statistical database design , 1981, TODS.

[18]  Zbigniew Michalewicz Compromisability of a statistical database , 1981, Inf. Syst..

[19]  Jeffrey D. Ullman,et al.  A model of statistical database their security , 1977, TODS.

[20]  Leland L. Beck,et al.  A security machanism for statistical database , 1980, TODS.

[21]  Peter J. Denning,et al.  The tracker: a threat to statistical database security , 1979, TODS.

[22]  Eugene Wong,et al.  A statistical approach to incomplete information in database systems , 1982, TODS.

[23]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[24]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[25]  E. F. Codd,et al.  A relational model of data for large shared data banks , 1970, CACM.

[26]  Dorothy E. Denning,et al.  A fast procedure for finding a tracker in a statistical database , 1980, TODS.

[27]  Witold Lipski,et al.  On semantic issues connected with incomplete information databases , 1979, ACM Trans. Database Syst..

[28]  E. F. Codd,et al.  Extending the database relational model to capture more meaning , 1979, ACM Trans. Database Syst..

[29]  Victor W. Marek,et al.  Information systems: on queries involving cardinalities , 1979, Inf. Syst..

[30]  Zbigniew Michalewicz Inference control in statistical databases with incomplete information , 1983, Inf. Syst..

[31]  Francis Y. L. Chin Security in statistical databases for queries with small counts , 1978, TODS.

[32]  Andrew Chi-Chih Yao A Note on a Conjecture of Kam and Ullman Concerning Statistical Databases , 1979, Inf. Process. Lett..