Inference control in statistical databases with incomplete information

Abstract The paper deals with the problem of inference control in statistical databases. We consider the case when database contains incomplete information and we study consequences of that fact. We propose the interpretation of a query language as ranges to protect confidential information and give a method for protecting statistical databases with incomplete information from a disclosure.

[1]  David K. Hsiao,et al.  A Semantic Model for Data Base Protection Languages , 1976, VLDB.

[2]  Gultekin Özsoyoglu,et al.  Statistical database design , 1981, TODS.

[3]  Richard J. Lipton,et al.  Foundations of Secure Computation , 1978 .

[4]  Peter J. Denning,et al.  The tracker: a threat to statistical database security , 1979, TODS.

[5]  Francis Y. L. Chin,et al.  Efficient Inference Control for Range SUM Queries on Statistical Data Bases , 1981, SSDBM.

[6]  Jeffrey D. Ullman,et al.  A model of statistical database their security , 1977, TODS.

[7]  James Marting,et al.  Security, Accuracy, and Privacy in Computer Systems , 1973 .

[8]  Peter J. Denning,et al.  Linear queries in statistical databases , 1979, ACM Trans. Database Syst..

[9]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[10]  Clement T. Yu,et al.  A study on the protection of statistical data bases , 1977, SIGMOD '77.

[11]  Peter J. Denning,et al.  Data Security , 1979, CSUR.

[12]  Victor W. Marek,et al.  Information systems: on queries involving cardinalities , 1979, Inf. Syst..

[13]  J. Schlörer Confidentiality of Statistical Records: A Threat-Monitoring Scheme for On Line Dialogue , 1976, Methods of Information in Medicine.

[14]  Victor W. Marek,et al.  Information Storage and Retrieval Systems: Mathematical Foundations , 1976, Theor. Comput. Sci..

[15]  David K. Hsiao,et al.  Information Secure Systems , 1976, Adv. Comput..

[16]  Dorothy E. Denning,et al.  Secure statistical databases with random sample queries , 1980, TODS.

[17]  Gultekin Özsoyoglu,et al.  Enhancing the Security of Statistical Databases with a Question-Answering System and a Kernel Design , 1982, IEEE Transactions on Software Engineering.

[18]  J. Schlörer Identification and Retrieval of Personal Records from a Statistical Data Bank , 1975, Methods of Information in Medicine.

[19]  David L. Wells,et al.  Database Security , 1978, IEEE Transactions on Software Engineering.

[20]  Jan Schlörer,et al.  Security of statistical databases: multidimensional transformation , 1980, TODS.

[21]  Andrew Chi-Chih Yao A Note on a Conjecture of Kam and Ullman Concerning Statistical Databases , 1979, Inf. Process. Lett..

[22]  Francis Y. L. Chin Security in statistical databases for queries with small counts , 1978, TODS.

[23]  Zbigniew Michalewicz Compromisability of a statistical database , 1981, Inf. Syst..

[24]  Jeffrey D. Ullman,et al.  Principles of Database Systems , 1980 .

[25]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[26]  Z. Meral Ozsoyoglu,et al.  Update handling techniques in statistical databases , 1981 .

[27]  Witold Lipski,et al.  On information storage and retrieval systems , 1977 .

[28]  Richard J. Lipton,et al.  Even Data Bases That Lie Can Be Compromised , 1978, IEEE Transactions on Software Engineering.

[29]  Jan van Leeuwen On Compromising Statistical Data-Bases with a few Known Elements , 1979, Inf. Process. Lett..

[30]  David K. Hsiao,et al.  Privacy and Security of Data Communications and Data Bases , 1978, VLDB.

[31]  Lance J. Hoffman,et al.  Modern methods for computer security and privacy , 1973 .

[32]  Zbigniew Michalewicz Statistical Databases: Their Model, Query Language and Security , 1983, SSDBM.