Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise
暂无分享,去创建一个
[1] Richard J. Lipton,et al. Even Data Bases That Lie Can Be Compromised , 1978, IEEE Transactions on Software Engineering.
[2] Steven P. Reiss. Security in Databases: A Combinatorial Study , 1979, JACM.
[3] Dorothy E. Denning,et al. A fast procedure for finding a tracker in a statistical database , 1980, TODS.
[4] Jeffrey D. Ullman,et al. A model of statistical database their security , 1977, TODS.
[5] J. Schlörer. Identification and Retrieval of Personal Records from a Statistical Data Bank , 1975, Methods of Information in Medicine.
[6] David L. Wells,et al. Database Security , 1978, IEEE Transactions on Software Engineering.
[7] Richard J. Lipton,et al. Secure databases: protection against user influence , 1979, TODS.
[8] Peter J. Denning,et al. The tracker: a threat to statistical database security , 1979, TODS.
[9] Mayer Dlugach Schwartz,et al. Inference from statistical data bases. , 1977 .
[10] J. Schlörer. Confidentiality of Statistical Records: A Threat-Monitoring Scheme for On Line Dialogue , 1976, Methods of Information in Medicine.
[11] P ReissSteven. Security in Databases , 1979 .
[12] Gio Wiederhold,et al. Database Design , 1977 .
[13] Ernst L. Leiss,et al. Principles of Data Security , 1982, Foundations of Computer Science.
[14] Peter J. Denning,et al. Linear queries in statistical databases , 1979, ACM Trans. Database Syst..
[15] Andrew Chi-Chih Yao. A Note on a Conjecture of Kam and Ullman Concerning Statistical Databases , 1979, Inf. Process. Lett..