Databases Reference
In-Depth Information
22. G. Miklau and D. Suciu. A formal analysis of information disclosure in data ex-
change. In Proceedings of the 23th ACM SIGMOD Conference on Management
of Data (SIGMOD'04) , 2004.
23. N. Pendse. The olap report - what is olap. OLAP Report Technical Report,
2001. http:// www.olapreport.com / fasmi.htm.
24. P. Samarati. Protecting respondents' identities in microdata release. IEEE
Transactions on Knowledge and Data Engineering , 13(6):1 010-1027, 2001.
25. R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access
control models. IEEE Computer , 29(2):38-47, 1996.
26. J. Schlorer. Security of statistical databases: multidimensional transformation.
ACM Trans. on Database Systems , 6(1):95-112, 1981.
27. A. Shoshani. OLAP and statistical databases: Similarities and differences. In
Proceedings of the Sixteenth ACM SIGACT-SIGMOD-SIGART Symposium on
Principles of Database Systems (PODS'97) , pages 185-196, 1997.
28. G. Pernul T. Priebe. Towards olap security design - survey and research issues.
In Proceedings of 3rd ACM International Workshop on Data Warehousing and
OLAP (DOLAP'00) , pages 114-121, 2000.
29. Pedersen T.B. and Jense C.S. Multidimensional database technology. IEEE
Computer , 34(12):40-46, 2001.
30. J.F. Traub, Y. Yemini, and H. Wozniakowski. The statistical security of a
statistical database. ACM Trans. on Database Systems , 9(4):672-679, 1984.
31. J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically
partitioned data. In Proceedings of the eighth ACM SIGKDD international
conference on Knowledge discovery and data mining (KDD'02) , pages 639-644,
2002.
32. L. Wang, S. Jajodia, and D. Wijesekera. Securing OLAP data cubes against
privacy breaches. In Proceedings of the 2004 IEEE Symposium on Security and
Privacy (S&P'04) , pages 161-175, 2004.
33. L. Wang, Y.J. Li, D. Wijesekera, and S. Jajodia. Precisely answering multi-
dimensional range queries without privacy breaches. In Proceedings of the Eighth
European Symposium on Research in Computer Security (ESORICS'03) , pages
100-115, 2003.
34. L. Wang, D. Wijesekera, and S. Jajodia. Cardinality-based inference control in
data cubes. Journal of Computer Security , 12(5):655-692, 2004.
35. L. Willenborg and T. de Walal. Statistical disclosure control in practice . Springer
Verlag, New York, 1996.
36. C. Yao, X. Wang, and S. Jajodia. Checking for k-anonymity violation by
views. In Proceedings of the Thirty-first Conference on Very Large Data Base
(VLDB'05) , 2005.
37. C.T. Yu and F.Y. Chin. A study on the protection of statistical data bases. In
Proceedings of the ACM SIGMOD International Conference on Management of
Data (SIGMOD'77) , pages 169-181, 1977.
Search WWH ::




Custom Search