Inference control in statistical databases with incomplete information
暂无分享,去创建一个
[1] David K. Hsiao,et al. A Semantic Model for Data Base Protection Languages , 1976, VLDB.
[2] Gultekin Özsoyoglu,et al. Statistical database design , 1981, TODS.
[3] Richard J. Lipton,et al. Foundations of Secure Computation , 1978 .
[4] Peter J. Denning,et al. The tracker: a threat to statistical database security , 1979, TODS.
[5] Francis Y. L. Chin,et al. Efficient Inference Control for Range SUM Queries on Statistical Data Bases , 1981, SSDBM.
[6] Jeffrey D. Ullman,et al. A model of statistical database their security , 1977, TODS.
[7] James Marting,et al. Security, Accuracy, and Privacy in Computer Systems , 1973 .
[8] Peter J. Denning,et al. Linear queries in statistical databases , 1979, ACM Trans. Database Syst..
[9] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[10] Clement T. Yu,et al. A study on the protection of statistical data bases , 1977, SIGMOD '77.
[11] Peter J. Denning,et al. Data Security , 1979, CSUR.
[12] Victor W. Marek,et al. Information systems: on queries involving cardinalities , 1979, Inf. Syst..
[13] J. Schlörer. Confidentiality of Statistical Records: A Threat-Monitoring Scheme for On Line Dialogue , 1976, Methods of Information in Medicine.
[14] Victor W. Marek,et al. Information Storage and Retrieval Systems: Mathematical Foundations , 1976, Theor. Comput. Sci..
[15] David K. Hsiao,et al. Information Secure Systems , 1976, Adv. Comput..
[16] Dorothy E. Denning,et al. Secure statistical databases with random sample queries , 1980, TODS.
[17] Gultekin Özsoyoglu,et al. Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design , 1982, IEEE Transactions on Software Engineering.
[18] J. Schlörer. Identification and Retrieval of Personal Records from a Statistical Data Bank , 1975, Methods of Information in Medicine.
[19] David L. Wells,et al. Database Security , 1978, IEEE Transactions on Software Engineering.
[20] Jan Schlörer,et al. Security of statistical databases: multidimensional transformation , 1980, TODS.
[21] Andrew Chi-Chih Yao. A Note on a Conjecture of Kam and Ullman Concerning Statistical Databases , 1979, Inf. Process. Lett..
[22] Francis Y. L. Chin. Security in statistical databases for queries with small counts , 1978, TODS.
[23] Zbigniew Michalewicz. Compromisability of a statistical database , 1981, Inf. Syst..
[24] Jeffrey D. Ullman,et al. Principles of Database Systems , 1980 .
[25] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[26] Z. Meral Ozsoyoglu,et al. Update handling techniques in statistical databases , 1981 .
[27] Witold Lipski,et al. On information storage and retrieval systems , 1977 .
[28] Richard J. Lipton,et al. Even Data Bases That Lie Can Be Compromised , 1978, IEEE Transactions on Software Engineering.
[29] Jan van Leeuwen. On Compromising Statistical Data-Bases with a few Known Elements , 1979, Inf. Process. Lett..
[30] David K. Hsiao,et al. Privacy and Security of Data Communications and Data Bases , 1978, VLDB.
[31] Lance J. Hoffman,et al. Modern methods for computer security and privacy , 1973 .
[32] Zbigniew Michalewicz. Statistical Databases: Their Model, Query Language and Security , 1983, SSDBM.