Are statistical databases secure?

Author(s)
Denning, D.E.
Year
Abstract

The "obvious" techniques for reducing the threat of compromise -e.g., limiting the range of allowable responses, restricting the amount of overlap between query sets, and certain rounding schemes are easily circumvented. Other techniques -e.g., partitioning- may be robust, but at the price of limiting the usefulness of the data base. The conclusion is that complete privacy cannot be enforced without severely restricting the free flow of information.

Request publication

1 + 0 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.

Publication

Library number
B 20186 fo /01/
Source

National Computer Conference Proceedings of the American Federation of Information Processing Societies AFIPS, Volume 47, 1978, p. 525-530, tab., ref.

Our collection

This publication is one of our other publications, and part of our extensive collection of road safety literature, that also includes the SWOV publications.