A formal analysis of information disclosure in data exchange
暂无分享,去创建一个
[1] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] C. Fortuin,et al. Correlation inequalities on some partially ordered sets , 1971 .
[4] Ronald Fagin,et al. Probabilities on finite models , 1976, Journal of Symbolic Logic.
[5] Nicolas Spyratos,et al. Protection of Information in Relational Data Bases , 1977, VLDB.
[6] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[7] Nicolas Spyratos,et al. Algebraic versus probabilstic independence in data bases , 1985, PODS.
[8] Per-Åke Larson,et al. Updating derived relations: detecting irrelevant and autonomously computable updates , 1986, VLDB.
[9] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[10] Charles Elkan,et al. Independence of logic database queries and update , 1990, PODS '90.
[11] Alon Y. Halevy,et al. Queries Independent of Updates , 1993, VLDB.
[12] Jennifer Widom,et al. Constraint checking with partial information , 1994, PODS.
[13] Elisa Bertino,et al. Database Security: Research and Practice , 1995, Inf. Syst..
[14] Avi Pfeffer,et al. Probabilistic Frame-Based Systems , 1998, AAAI/IAAI.
[15] Ben Taskar,et al. Selectivity estimation using probabilistic models , 2001, SIGMOD '01.
[16] Alon Y. Halevy,et al. Answering queries using views: A survey , 2001, The VLDB Journal.
[17] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[18] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[19] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[20] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[21] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[22] Chen Li,et al. Secure XML Publishing without Information Leakage in the Presence of Data Inference , 2004, VLDB.
[23] Alin Deutsch,et al. Privacy in Database Publishing , 2005, ICDT.
[24] Dan Suciu,et al. Asymptotic Conditional Probabilities for Conjunctive Queries , 2005, ICDT.