Security-control methods for statistical databases: a comparative study

NR Adam, JC Worthmann - ACM Computing Surveys (CSUR), 1989 - dl.acm.org
This paper considers the problem of providing security to statistical databases against
disclosure of confidential information. Security-control methods suggested in the literature …

Formal models for computer security

CE Landwehr - ACM Computing Surveys (CSUR), 1981 - dl.acm.org
Efforts to build" secure" computer systems have now been underway for more than a
decade. Many designs have been proposed, some prototypes have been constructed, and a …

The science of guessing: analyzing an anonymized corpus of 70 million passwords

J Bonneau - 2012 IEEE symposium on security and privacy, 2012 - ieeexplore.ieee.org
We report on the largest corpus of user-chosen passwords ever studied, consisting of
anonymized password histograms representing almost 70 million Yahoo! users, mitigating …

Privacy and data protection by design-from policy to engineering

G Danezis, J Domingo-Ferrer, M Hansen… - arXiv preprint arXiv …, 2015 - arxiv.org
Privacy and data protection constitute core values of individuals and of democratic societies.
There have been decades of debate on how those values-and legal obligations-can be …

Differential privacy: A survey of results

C Dwork - International conference on theory and applications of …, 2008 - Springer
Over the past five years a new approach to privacy-preserving data analysis has born fruit
[13, 18, 7, 19, 5, 37, 35, 8, 32]. This approach differs from much (but not all!) of the related …

k-anonymity: A model for protecting privacy

L Sweeney - International journal of uncertainty, fuzziness and …, 2002 - World Scientific
Consider a data holder, such as a hospital or a bank, that has a privately held collection of
person-specific, field structured data. Suppose the data holder wants to share a version of …

L-diversity: Privacy beyond k-anonymity

A Machanavajjhala, D Kifer, J Gehrke… - Acm transactions on …, 2007 - dl.acm.org
Publishing data about individuals without revealing sensitive information about them is an
important problem. In recent years, a new definition of privacy called k-anonymity has …

Privacy-preserving data mining

R Agrawal, R Srikant - Proceedings of the 2000 ACM SIGMOD …, 2000 - dl.acm.org
A fruitful direction for future data mining research will be the development of techniques that
incorporate privacy concerns. Specifically, we address the following question. Since the …

[PDF][PDF] Cryptography and Data Security

DE Denning - 1982 - calhoun.nps.edu
Electronic computers have evolved from exiguous experimental enterprises in the 1940s to
prolific practical data processing systems in the 1980s. As we have come to rely on these …

Revealing information while preserving privacy

I Dinur, K Nissim - Proceedings of the twenty-second ACM SIGMOD …, 2003 - dl.acm.org
We examine the tradeoff between privacy and usability of statistical databases. We model a
statistical database by an n-bit string d 1,.., dn, with a query being a subset q⊆[n] to be …