- Beck, L.L. A Security Mechanism for Statistical Databases. ACM Trans. Database Syst. 5, 3 (Sept. 1980), 316-338. Google ScholarDigital Library
- Conway, R., and Strip, D. Selective Partial Access to a Database. Proc 1976 ACM Ann. Conf., 85-89. Google ScholarDigital Library
- Dalenius, T. Privacy Transformations for Statistical Information Systems. Journal of Statistical Planning and Inference (1977), 73-86.Google ScholarCross Ref
- Dalenius, T. and Reiss, S.P. Data-swapping: a technique for disclosure control. Proceedings of the Section on Survey Research Methods, Amer. Stat. Assoc., (1978), 191-196.Google Scholar
- Denning, D.E., Denning, P.J., and Schwartz, M.D. The Tracker: A Threat to Statitical Database Security. ACM Trans. Database Syst. 4, 1 (March 1979), 76-96. Google ScholarDigital Library
- Denning, D.E. Secure Statistical Databases with Random Sample Queries. ACM Trans. Database Syst. 5, 3 (Sept. 1980), 291-315. Google ScholarDigital Library
- Hoffman, L.J. Modern Methods for Computer Security and Privacy. Prentice Hall, Inc. (1977).Google Scholar
- Reiss, S.P. Practical Data-swapping: The First Steps. J IEEE Symposium on Security and Privacy, (1980).Google Scholar
- Schwartz, M.D., Denning, D.E., and Denning, P.J. Theory of Linear Queries in Databases. Purdue University, (Nov. 1976).Google Scholar
- Ullman, J.D. Principles of Database Systems. Computer Science Press, Inc. (1980). Google ScholarDigital Library
Recommendations
Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving
Privacy Preserving Data Mining (PPDM) can prevent private data from disclosure in data mining. However, the current PPDM methods damaged the values of original data where knowledge from the mined data cannot be verified from the original data. In this ...
RFID privacy: relation between two notions, minimal condition, and efficient construction
CCS '09: Proceedings of the 16th ACM conference on Computer and communications securityPrivacy of RFID systems is receiving increasing attention in the RFID community. Basically, there are two kinds of RFID privacy notions: one based on the indistinguishability of two tags, denoted as ind-privacy, and the other based on the ...
A privacy framework: indistinguishable privacy
EDBT '13: Proceedings of the Joint EDBT/ICDT 2013 WorkshopsIn this paper we illustrate a privacy framework named Indistinguishable Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party ...
Comments