Non-reversible privacy transformations

作者: Steven P. Reiss , Mark J. Post , Tore Dalenius

DOI: 10.1145/588111.588134

关键词: Internet privacyComputer science

摘要:

参考文章(9)
Leland L. Beck, A security machanism for statistical database ACM Transactions on Database Systems. ,vol. 5, pp. 316- 3338 ,(1980) , 10.1145/320613.320617
Richard Conway, David Strip, Selective partial access to a database Proceedings of the annual conference on - ACM 76. pp. 85- 89 ,(1976) , 10.1145/800191.805537
Tore Dalenius, Privacy transformations for statistical information systems Journal of Statistical Planning and Inference. ,vol. 1, pp. 73- 86 ,(1977) , 10.1016/0378-3758(77)90007-6
Tore Dalenius, Steven P. Reiss, Data-swapping: A technique for disclosure control Journal of Statistical Planning and Inference. ,vol. 6, pp. 73- 85 ,(1982) , 10.1016/0378-3758(82)90058-1
Steven P. Reiss, Practical Data-Swapping: The First Steps ieee symposium on security and privacy. pp. 38- 38 ,(1980) , 10.1109/SP.1980.10014
Dorothy E. Denning, Secure statistical databases with random sample queries ACM Transactions on Database Systems. ,vol. 5, pp. 291- 315 ,(1980) , 10.1145/320613.320616
Dorothy E Denning, Peter J Denning, None, The tracker: a threat to statistical database security ACM Transactions on Database Systems. ,vol. 4, pp. 76- 96 ,(1979) , 10.1145/320064.320069
Jeffrey D. Ullman, Principles of Database Systems 379 p. : ill. Potomac, Maryland: Computer Science Press, 1980. includes bibliography: p.360-371 and index. -- (Computer Software Engineering Series). ,(1980)