Databases Reference
In-Depth Information
22. G. Miklau and D. Suciu. A formal analysis of information disclosure in data ex-
change. In
Proceedings of the 23th ACM SIGMOD Conference on Management
of Data (SIGMOD'04)
, 2004.
23. N. Pendse. The olap report - what is olap. OLAP Report Technical Report,
2001. http:// www.olapreport.com / fasmi.htm.
24. P. Samarati. Protecting respondents' identities in microdata release.
IEEE
Transactions on Knowledge and Data Engineering
, 13(6):1 010-1027, 2001.
25. R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access
control models.
IEEE Computer
, 29(2):38-47, 1996.
26. J. Schlorer. Security of statistical databases: multidimensional transformation.
ACM Trans. on Database Systems
, 6(1):95-112, 1981.
27. A. Shoshani. OLAP and statistical databases: Similarities and differences. In
Proceedings of the Sixteenth ACM SIGACT-SIGMOD-SIGART Symposium on
Principles of Database Systems (PODS'97)
, pages 185-196, 1997.
28. G. Pernul T. Priebe. Towards olap security design - survey and research issues.
In
Proceedings of 3rd ACM International Workshop on Data Warehousing and
OLAP (DOLAP'00)
, pages 114-121, 2000.
29. Pedersen T.B. and Jense C.S. Multidimensional database technology.
IEEE
Computer
, 34(12):40-46, 2001.
30. J.F. Traub, Y. Yemini, and H. Wozniakowski. The statistical security of a
statistical database.
ACM Trans. on Database Systems
, 9(4):672-679, 1984.
31. J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically
partitioned data. In
Proceedings of the eighth ACM SIGKDD international
conference on Knowledge discovery and data mining (KDD'02)
, pages 639-644,
2002.
32. L. Wang, S. Jajodia, and D. Wijesekera. Securing OLAP data cubes against
privacy breaches. In
Proceedings of the 2004 IEEE Symposium on Security and
Privacy (S&P'04)
, pages 161-175, 2004.
33. L. Wang, Y.J. Li, D. Wijesekera, and S. Jajodia. Precisely answering multi-
dimensional range queries without privacy breaches. In
Proceedings of the Eighth
European Symposium on Research in Computer Security (ESORICS'03)
, pages
100-115, 2003.
34. L. Wang, D. Wijesekera, and S. Jajodia. Cardinality-based inference control in
data cubes.
Journal of Computer Security
, 12(5):655-692, 2004.
35. L. Willenborg and T. de Walal.
Statistical disclosure control in practice
. Springer
Verlag, New York, 1996.
36. C. Yao, X. Wang, and S. Jajodia. Checking for k-anonymity violation by
views. In
Proceedings of the Thirty-first Conference on Very Large Data Base
(VLDB'05)
, 2005.
37. C.T. Yu and F.Y. Chin. A study on the protection of statistical data bases. In
Proceedings of the ACM SIGMOD International Conference on Management of
Data (SIGMOD'77)
, pages 169-181, 1977.