Security-control methods for statistical databases: a comparative study

NR Adam, JC Worthmann - ACM Computing Surveys (CSUR), 1989 - dl.acm.org
This paper considers the problem of providing security to statistical databases against
disclosure of confidential information. Security-control methods suggested in the literature …

Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

Calibrating noise to sensitivity in private data analysis

C Dwork, F McSherry, K Nissim… - … of Privacy and …, 2016 - journalprivacyconfidentiality.org
Calibrating Noise to Sensitivity in Private Data Analysis Page 1 Journal of Privacy and
Confidentiality (2016-2017) 7, Number 3, 17–51 Calibrating Noise to Sensitivity in Private Data …

Differential privacy: A survey of results

C Dwork - International conference on theory and applications of …, 2008 - Springer
Over the past five years a new approach to privacy-preserving data analysis has born fruit
[13, 18, 7, 19, 5, 37, 35, 8, 32]. This approach differs from much (but not all!) of the related …

Calibrating noise to sensitivity in private data analysis

C Dwork, F McSherry, K Nissim, A Smith - … , TCC 2006, New York, NY, USA …, 2006 - Springer
We continue a line of research initiated in [10, 11] on privacy-preserving statistical
databases. Consider a trusted server that holds a database of sensitive information. Given a …

Differential privacy

C Dwork - International colloquium on automata, languages, and …, 2006 - Springer
In 1977 Dalenius articulated a desideratum for statistical databases: nothing about an
individual should be learnable from the database that cannot be learned without access to …

L-diversity: Privacy beyond k-anonymity

A Machanavajjhala, D Kifer, J Gehrke… - Acm transactions on …, 2007 - dl.acm.org
Publishing data about individuals without revealing sensitive information about them is an
important problem. In recent years, a new definition of privacy called k-anonymity has …

[图书][B] An introduction to database systems

CJ Date - 1977 - books.google.com
• Part VI (three chapters) describes the impact of object technology on database systems.
Chapter 25 describes object systems specifically; Chapter 26 considers the possibility of a …

Privacy-preserving data mining

R Agrawal, R Srikant - Proceedings of the 2000 ACM SIGMOD …, 2000 - dl.acm.org
A fruitful direction for future data mining research will be the development of techniques that
incorporate privacy concerns. Specifically, we address the following question. Since the …

A firm foundation for private data analysis

C Dwork - Communications of the ACM, 2011 - dl.acm.org
A firm foundation for private data analysis Page 1 86 communications of the acm | january
2011 | vol. 54 | no. 1 review articles This long history is a testament to the importance of the …