Finding Trackers

To avoid trivial compromises, most on-line statistical databases refuse to answer queries for statistics about small subgroups... A tracker is a set of auxiliary characteristics which are added to the original characteristics in the formation of a query ... to form answerable queries. The questioner subtracts out the effect of the auxiliary characteristics ...

Dorothy E. Denning, Peter J. Denning The tracker: a threat to statistical database security. ACM Transactions on Database Systems, Vol. 4, No. 1, pp. 76–96, March 1979.

Dorothy E. Denning, Jan Schlörer. A fast procedure for finding a tracker in a statistical database. ACM Transactions on Database Systems, Vol. 5, No. 1, pp. 88–102, March 1980.

Statistical Inference Problem

Nabil R. Adam, John C. Wortmann. Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys, Vol. 21, No. 4, pp. 515–556, December 1989.

Gerome Miklau, Dan Suciu. A Formal Analysis of Information Disclosure in Data Exchange. Journal of Comput. Syst. Sci., 2006.

George T. Duncan, Sumita Mukherjee. Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks Through Additive Noise. Journal of the American Statistical Association, Vol. 95, No. 451, pp. 720–729, 2000.

Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith, Hoeteck Wee. Towards Privacy in Public Databases. Theory of Cryptography Conference, 2005.

Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia. Auditing Interval-Based Inference. Proceedings of Advanced Information Systems Engineering, 14th International Conference, CAiSE 2002, Toronto, pp. 553–567, 2002.

Lingyu Wang, Sushil Jajodia, Duminda Wijesekera. Securing OLAP Data Cubes Against Privacy Breaches. Proceedings of 2004 IEEE Symposium on Security and Privacy, pp. 161–175.

...

Secure Deductive Databases

Piero Bonatti, Sarit Kraus, V.S. Subrahmanian. Foundations of Secure Deductive Databases. IEEE Transactions on Knowledge and Data Engineering, Vol. 7, No. 3, pp. 406–422, 1995.

Microdata Protection

Grup Crises. An Introduction to Microdata Protection for Database Privacy. Research Report CRIREP-04-006, September 2004.

Ruth Brand. Microdata Protection through Noise Addition. Inference Control in Statistical Databases: from Theory to Practice (LNCS 2316), pp. 97–116, 2002.

Silvia Polettini, Luisa Franconi, Julian Stander. Model Based Disclosure Protection. Inference Control in Statistical Databases: from Theory to Practice (LNCS 2316), pp. 83–96, 2002.

Jerome P. Reiter. Releasing multiply imputed, synthetic public use microdata: an illustration and empirical study. Journal of the Royal Statistical Society Series A, Vol. 168, Part 1, pp. 185–205, 2005.

Krish Muralidhar, Rathindra Sarathy, Ramesh Dandekar. Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data. Proceedings of Privacy in Statistical Databases — PSD 2006, pp. 164–176, Rome, Italy, December 2006.

Natalie Shlomo, Ton De Waal. Preserving edits when perturbing microdata for statistical disclosure control. Statistical Journal of the United Nations Economic Commission for Europe, Vol. 22, No. 2, pp. 173–185, 2005.

Privacy-preserving data mining

Alberto Maria Segre, Andrew Wildenberg, Veronica Vieland, Ying Zhang. Privacy-Preserving Data Set Union. Proceedings of Privacy in Statistical Databases — PSD 2006, pp. 266–276, Rome, Italy, December 2006.

Lea Kissner, Dawn Song. Privacy-Preserving Set Operations. Proceedings of CRYPTO 2005.

Justin Brickell, Vitaly Shmatikov. Privacy-Preserving Graph Algorithms in the Semi-honest Model. Proceedings of ASIACRYPT 2005.

Private information retrieval

David Woodruff, Jessica Staddon. Private Inference Control. Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 188–197, 2004.

Searching over encrypted data

Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. Cryptology ePrint Archive: Report 2006/210.

Mihir Bellare, Alexandra Boldyreva, Adam O'Neill. Efficiently-Searchable and Deterministic Asymmetric Encryption. Cryptology ePrint Archive: Report 2006/186.

Hakan Hacıgümüş, Bala Iyer, Chen Li, Sharad Mehrotra. Executing SQL over Encrypted Data in the Database-Service-Provider Model. Proceedings on 2002 ACM SIGMOD Conference on Management of Data, June 2002.

Dawn Xiaodong Song, David Wagner, Adrian Perrig. Practical Techniques for Searches on Encrypted Data. Proceedings of 2000 IEEE Symposium on Security and Privacy.

Obfuscated databases

Arvind Narayanan, Vitaly Shmatikov. Obfuscated Databases and Group Privacy. 12th ACM Conference on Computer and Communications Security, pp. 102–111, November 7-11 2005.

Database watermarking

Rakesh Agrawal, Jerry Kiernan. Watermarking Relational Databases. Proceedings of the 28th VLDB Conference, Hong Kong, 2002.

Authenticated data structures

Cryptographic access control for XML documents

Gerome Miklau, Dan Suciu. Cryptographically Enforced Conditional Access for XML. Proceedings of the 5th International Workshop on the Web and Databases, WebDB 2002.

Gerome Miklau, Dan Suciu. Controlling Access to Published Data Using Cryptography. Proceedings of the 29th VLDB Conference, Berlin, 2003.

Vaba teema

Kui kellelgi juba oma kindel teema olemas on.