The inaccessible set: A classification by query type of security risks in statistical databases
The inaccessible set consists of those elements in a statistical database which cannot be compromised if queries of a certain fixed type are used. We define the size of the inaccessible set as a measure of the security of statistical databases; this measure has the property that it reflects changes...
Gespeichert in:
Veröffentlicht in: | Information processing letters 1986-12, Vol.23 (5), p.275-279 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 279 |
---|---|
container_issue | 5 |
container_start_page | 275 |
container_title | Information processing letters |
container_volume | 23 |
creator | Leiss, Ernst L. |
description | The inaccessible set consists of those elements in a statistical database which cannot be compromised if queries of a certain fixed type are used. We define the size of the inaccessible set as a measure of the security of statistical databases; this measure has the property that it reflects changes in the type of the queries in a very direct way. We then derive several of these measures for various types of queries. |
doi_str_mv | 10.1016/0020-0190(86)90086-4 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_237257287</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>0020019086900864</els_id><sourcerecordid>1136750</sourcerecordid><originalsourceid>FETCH-LOGICAL-c314t-31388a3f0b28a0244d7823f5435f0a6d04eed65dc0b31c4d2e8153fb0d5259013</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKv_wEPwpIfVycfuZj0IpfgFBS_1HLLJLKau3Zqkwv57UysePQWG530n8xByzuCaAatuADgUwBq4VNVVA6CqQh6QCVM1LyrGmkMy-UOOyUmMKwCopKgnRC_fkPq1sRZj9G2PNGK6pTNqe5MHnbcm-WFN25F-bjGMNI0bpEOXMbsNPo00-PgecwWNKaMx5URPnUmmNRHjKTnqTB_x7PedkteH--X8qVi8PD7PZ4vCCiZTIZhQyogOWq4McCldrbjoSinKDkzlQCK6qnQWWsGsdBwVK0XXgit52QATU3Kx792EIX80Jr0atmGdV2oual7WXNUZknvIhiHGgJ3eBP9hwqgZ6J1JvdOkd5q0qvSPSS1z7G4fw3zAl8ego_W4tuh8QJu0G_z_Bd-L7nn8</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>237257287</pqid></control><display><type>article</type><title>The inaccessible set: A classification by query type of security risks in statistical databases</title><source>Access via ScienceDirect (Elsevier)</source><creator>Leiss, Ernst L.</creator><creatorcontrib>Leiss, Ernst L.</creatorcontrib><description>The inaccessible set consists of those elements in a statistical database which cannot be compromised if queries of a certain fixed type are used. We define the size of the inaccessible set as a measure of the security of statistical databases; this measure has the property that it reflects changes in the type of the queries in a very direct way. We then derive several of these measures for various types of queries.</description><identifier>ISSN: 0020-0190</identifier><identifier>EISSN: 1872-6119</identifier><identifier>DOI: 10.1016/0020-0190(86)90086-4</identifier><identifier>CODEN: IFPLAT</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>comparing security risks ; compromise ; Confidentiality ; Cybersecurity ; Information retrieval ; Mathematical analysis ; Queries ; Statistical data ; Statistical databases ; types of statistical queries</subject><ispartof>Information processing letters, 1986-12, Vol.23 (5), p.275-279</ispartof><rights>1986</rights><rights>Copyright Elsevier Sequoia S.A. Dec 3, 1986</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c314t-31388a3f0b28a0244d7823f5435f0a6d04eed65dc0b31c4d2e8153fb0d5259013</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/0020-0190(86)90086-4$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>315,781,785,3551,27929,27930,46000</link.rule.ids></links><search><creatorcontrib>Leiss, Ernst L.</creatorcontrib><title>The inaccessible set: A classification by query type of security risks in statistical databases</title><title>Information processing letters</title><description>The inaccessible set consists of those elements in a statistical database which cannot be compromised if queries of a certain fixed type are used. We define the size of the inaccessible set as a measure of the security of statistical databases; this measure has the property that it reflects changes in the type of the queries in a very direct way. We then derive several of these measures for various types of queries.</description><subject>comparing security risks</subject><subject>compromise</subject><subject>Confidentiality</subject><subject>Cybersecurity</subject><subject>Information retrieval</subject><subject>Mathematical analysis</subject><subject>Queries</subject><subject>Statistical data</subject><subject>Statistical databases</subject><subject>types of statistical queries</subject><issn>0020-0190</issn><issn>1872-6119</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1986</creationdate><recordtype>article</recordtype><recordid>eNp9kE1LAzEQhoMoWKv_wEPwpIfVycfuZj0IpfgFBS_1HLLJLKau3Zqkwv57UysePQWG530n8xByzuCaAatuADgUwBq4VNVVA6CqQh6QCVM1LyrGmkMy-UOOyUmMKwCopKgnRC_fkPq1sRZj9G2PNGK6pTNqe5MHnbcm-WFN25F-bjGMNI0bpEOXMbsNPo00-PgecwWNKaMx5URPnUmmNRHjKTnqTB_x7PedkteH--X8qVi8PD7PZ4vCCiZTIZhQyogOWq4McCldrbjoSinKDkzlQCK6qnQWWsGsdBwVK0XXgit52QATU3Kx792EIX80Jr0atmGdV2oual7WXNUZknvIhiHGgJ3eBP9hwqgZ6J1JvdOkd5q0qvSPSS1z7G4fw3zAl8ego_W4tuh8QJu0G_z_Bd-L7nn8</recordid><startdate>19861203</startdate><enddate>19861203</enddate><creator>Leiss, Ernst L.</creator><general>Elsevier B.V</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>19861203</creationdate><title>The inaccessible set: A classification by query type of security risks in statistical databases</title><author>Leiss, Ernst L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c314t-31388a3f0b28a0244d7823f5435f0a6d04eed65dc0b31c4d2e8153fb0d5259013</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1986</creationdate><topic>comparing security risks</topic><topic>compromise</topic><topic>Confidentiality</topic><topic>Cybersecurity</topic><topic>Information retrieval</topic><topic>Mathematical analysis</topic><topic>Queries</topic><topic>Statistical data</topic><topic>Statistical databases</topic><topic>types of statistical queries</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Leiss, Ernst L.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Information processing letters</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Leiss, Ernst L.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The inaccessible set: A classification by query type of security risks in statistical databases</atitle><jtitle>Information processing letters</jtitle><date>1986-12-03</date><risdate>1986</risdate><volume>23</volume><issue>5</issue><spage>275</spage><epage>279</epage><pages>275-279</pages><issn>0020-0190</issn><eissn>1872-6119</eissn><coden>IFPLAT</coden><abstract>The inaccessible set consists of those elements in a statistical database which cannot be compromised if queries of a certain fixed type are used. We define the size of the inaccessible set as a measure of the security of statistical databases; this measure has the property that it reflects changes in the type of the queries in a very direct way. We then derive several of these measures for various types of queries.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/0020-0190(86)90086-4</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0020-0190 |
ispartof | Information processing letters, 1986-12, Vol.23 (5), p.275-279 |
issn | 0020-0190 1872-6119 |
language | eng |
recordid | cdi_proquest_journals_237257287 |
source | Access via ScienceDirect (Elsevier) |
subjects | comparing security risks compromise Confidentiality Cybersecurity Information retrieval Mathematical analysis Queries Statistical data Statistical databases types of statistical queries |
title | The inaccessible set: A classification by query type of security risks in statistical databases |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-15T20%3A42%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20inaccessible%20set:%20A%20classification%20by%20query%20type%20of%20security%20risks%20in%20statistical%20databases&rft.jtitle=Information%20processing%20letters&rft.au=Leiss,%20Ernst%20L.&rft.date=1986-12-03&rft.volume=23&rft.issue=5&rft.spage=275&rft.epage=279&rft.pages=275-279&rft.issn=0020-0190&rft.eissn=1872-6119&rft.coden=IFPLAT&rft_id=info:doi/10.1016/0020-0190(86)90086-4&rft_dat=%3Cproquest_cross%3E1136750%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=237257287&rft_id=info:pmid/&rft_els_id=0020019086900864&rfr_iscdi=true |