On flow control mechanisms and their impacts upon statistical databases
暂无分享,去创建一个
[1] T. C. Ting,et al. An Analysis of Database Security with Queries for High Order Statistical Information , 1988, DBSec.
[2] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[3] Peter J. Denning,et al. The tracker: a threat to statistical database security , 1979, TODS.
[4] Jeffrey S. Simonoff,et al. The use of regression methodology for the compromise of confidential information in statistical databases , 1987, TODS.
[5] Dorothy E. Denning,et al. A fast procedure for finding a tracker in a statistical database , 1980, TODS.
[6] Richard J. Lipton,et al. Secure databases: protection against user influence , 1979, TODS.
[7] Wiebren de Jonge,et al. Compromising statistical databases responding to queries about means , 1983, TODS.
[8] Jan Schlörer,et al. Security of statistical databases: multidimensional transformation , 1980, TODS.
[9] Dorothy E. Denning,et al. Inference Controls for Statistical Databases , 1983, Computer.
[10] Arie Shoshani,et al. Statistical Databases: Characteristics, Problems, and some Solutions , 1982, VLDB.
[11] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[12] Peter J. Denning,et al. Data Security , 1979, CSUR.