Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise

Disclosure limitation methods transform statistical databases to protect confidentiality, a practical concern of statistical agencies. A statistical database responds to queries with aggregate statistics. The database administrator should maximize legitimate data access while keeping the risk of dis...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of the American Statistical Association 2000-09, Vol.95 (451), p.720-729
Hauptverfasser: Duncan, George T., Mukherjee, Sumitra
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 729
container_issue 451
container_start_page 720
container_title Journal of the American Statistical Association
container_volume 95
creator Duncan, George T.
Mukherjee, Sumitra
description Disclosure limitation methods transform statistical databases to protect confidentiality, a practical concern of statistical agencies. A statistical database responds to queries with aggregate statistics. The database administrator should maximize legitimate data access while keeping the risk of disclosure below an acceptable level. Legitimate users seek statistical information, generally in aggregate form; malicious users-the data snoopers-attempt to infer confidential information about an individual data subject. Tracker attacks are of special concern for databases accessed online. This article derives optimal disclosure limitation strategies under tracker attacks for the important case of data masking through additive noise. Operational measures of the utility of data access and of disclosure risk are developed. The utility of data access is expressed so that trade-offs can be made between the quantity and the quality of data to be released. Application is made to Ohio data from the 1990 census. The article derives conditions under which an attack by a data snooper is better thwarted by a combination of query restriction and data masking than by either disclosure limitation method separately. Data masking by independent noise addition and data perturbation are considered as extreme cases in the continuum of data masking using positively correlated additive noise. Optimal strategies are established for the data snooper. Circumstances are determined under which adding autocorrelated noise is preferable to using existing methods of either independent noise addition or data perturbation. Both moving average and autoregressive noise addition are considered.
doi_str_mv 10.1080/01621459.2000.10474260
format Article
fullrecord <record><control><sourceid>jstor_proqu</sourceid><recordid>TN_cdi_proquest_miscellaneous_38937877</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>2669452</jstor_id><sourcerecordid>2669452</sourcerecordid><originalsourceid>FETCH-LOGICAL-c370t-ba8c5e52a7ca9fb95b0a58586906fa1b3d33394406dc1b35edb13359d23dcfbb3</originalsourceid><addsrcrecordid>eNqFkV1rFDEUhoMouFb_ggQV76bN94d3S-sXLO2FFbwLmUxmm3V2sk0yyv57M26XFkF6lZPDc17OeV8AXmN0ipFCZwgLghnXpwShucUkIwI9AQvMqWyIZD-egsUMNTP1HLzIeVNJJJVagNurXQlbO8CLkN0Q85Q8XIVtKLaEOMJvJdni13sY5rr2cglupm2xrc0-f4AXvviUwriG18m6nz7BZSm1yLDcpDitb-Cy60IJvzy8jCH7l-BZb4fsX929J-D7p4_X51-a1dXnr-fLVeOoRKVprXLcc2Kls7pvNW-R5YoroZHoLW5pRynVjCHRufrjvmsxpVx3hHaub1t6At4fdHcp3k4-F7OtJ_phsKOPUzZUaSqVlBV88w-4iVMa626mmqcI14JV6O3_IFwNr7vwv5Q4UC7FnJPvzS5Vd9PeYGTmsMwxLDOHZY5h1cF3d_I2V3_7ZEcX8v00kxRheY9tconpoTihSBoihGacVGx5wMLYx7S1v2MaOlPsfojpKE0f2egP9oK0CA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>274825964</pqid></control><display><type>article</type><title>Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise</title><source>Jstor Complete Legacy</source><source>Taylor &amp; Francis Journals Complete</source><source>Periodicals Index Online</source><source>JSTOR Mathematics &amp; Statistics Collection</source><creator>Duncan, George T. ; Mukherjee, Sumitra</creator><creatorcontrib>Duncan, George T. ; Mukherjee, Sumitra</creatorcontrib><description>Disclosure limitation methods transform statistical databases to protect confidentiality, a practical concern of statistical agencies. A statistical database responds to queries with aggregate statistics. The database administrator should maximize legitimate data access while keeping the risk of disclosure below an acceptable level. Legitimate users seek statistical information, generally in aggregate form; malicious users-the data snoopers-attempt to infer confidential information about an individual data subject. Tracker attacks are of special concern for databases accessed online. This article derives optimal disclosure limitation strategies under tracker attacks for the important case of data masking through additive noise. Operational measures of the utility of data access and of disclosure risk are developed. The utility of data access is expressed so that trade-offs can be made between the quantity and the quality of data to be released. Application is made to Ohio data from the 1990 census. The article derives conditions under which an attack by a data snooper is better thwarted by a combination of query restriction and data masking than by either disclosure limitation method separately. Data masking by independent noise addition and data perturbation are considered as extreme cases in the continuum of data masking using positively correlated additive noise. Optimal strategies are established for the data snooper. Circumstances are determined under which adding autocorrelated noise is preferable to using existing methods of either independent noise addition or data perturbation. Both moving average and autoregressive noise addition are considered.</description><identifier>ISSN: 0162-1459</identifier><identifier>EISSN: 1537-274X</identifier><identifier>DOI: 10.1080/01621459.2000.10474260</identifier><identifier>CODEN: JSTNAL</identifier><language>eng</language><publisher>Alexandria, VA: Taylor &amp; Francis Group</publisher><subject>Applications and Case Studies ; Applied sciences ; Autocorrelation ; Computer database ; Computer science; control theory; systems ; Confidentiality ; Correlation ; Data access ; Data masking ; Data perturbation ; Data processing. List processing. Character string processing ; Database administration ; Estimators ; Exact sciences and technology ; Information retrieval noise ; Linear inference, regression ; Mathematics ; Memory organisation. Data processing ; Noise ; Noise control ; Numeric databases ; Objective functions ; Privacy ; Probability and statistics ; Sciences and techniques of general use ; Software ; Statistical variance ; Statistics</subject><ispartof>Journal of the American Statistical Association, 2000-09, Vol.95 (451), p.720-729</ispartof><rights>Copyright Taylor &amp; Francis Group, LLC 2000</rights><rights>Copyright 2000 American Statistical Association</rights><rights>2000 INIST-CNRS</rights><rights>Copyright American Statistical Association Sep 2000</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c370t-ba8c5e52a7ca9fb95b0a58586906fa1b3d33394406dc1b35edb13359d23dcfbb3</citedby><cites>FETCH-LOGICAL-c370t-ba8c5e52a7ca9fb95b0a58586906fa1b3d33394406dc1b35edb13359d23dcfbb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/2669452$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/2669452$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>314,776,780,799,828,27846,27901,27902,57992,57996,58225,58229,59620,60409</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=1473017$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Duncan, George T.</creatorcontrib><creatorcontrib>Mukherjee, Sumitra</creatorcontrib><title>Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise</title><title>Journal of the American Statistical Association</title><description>Disclosure limitation methods transform statistical databases to protect confidentiality, a practical concern of statistical agencies. A statistical database responds to queries with aggregate statistics. The database administrator should maximize legitimate data access while keeping the risk of disclosure below an acceptable level. Legitimate users seek statistical information, generally in aggregate form; malicious users-the data snoopers-attempt to infer confidential information about an individual data subject. Tracker attacks are of special concern for databases accessed online. This article derives optimal disclosure limitation strategies under tracker attacks for the important case of data masking through additive noise. Operational measures of the utility of data access and of disclosure risk are developed. The utility of data access is expressed so that trade-offs can be made between the quantity and the quality of data to be released. Application is made to Ohio data from the 1990 census. The article derives conditions under which an attack by a data snooper is better thwarted by a combination of query restriction and data masking than by either disclosure limitation method separately. Data masking by independent noise addition and data perturbation are considered as extreme cases in the continuum of data masking using positively correlated additive noise. Optimal strategies are established for the data snooper. Circumstances are determined under which adding autocorrelated noise is preferable to using existing methods of either independent noise addition or data perturbation. Both moving average and autoregressive noise addition are considered.</description><subject>Applications and Case Studies</subject><subject>Applied sciences</subject><subject>Autocorrelation</subject><subject>Computer database</subject><subject>Computer science; control theory; systems</subject><subject>Confidentiality</subject><subject>Correlation</subject><subject>Data access</subject><subject>Data masking</subject><subject>Data perturbation</subject><subject>Data processing. List processing. Character string processing</subject><subject>Database administration</subject><subject>Estimators</subject><subject>Exact sciences and technology</subject><subject>Information retrieval noise</subject><subject>Linear inference, regression</subject><subject>Mathematics</subject><subject>Memory organisation. Data processing</subject><subject>Noise</subject><subject>Noise control</subject><subject>Numeric databases</subject><subject>Objective functions</subject><subject>Privacy</subject><subject>Probability and statistics</subject><subject>Sciences and techniques of general use</subject><subject>Software</subject><subject>Statistical variance</subject><subject>Statistics</subject><issn>0162-1459</issn><issn>1537-274X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2000</creationdate><recordtype>article</recordtype><sourceid>K30</sourceid><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNqFkV1rFDEUhoMouFb_ggQV76bN94d3S-sXLO2FFbwLmUxmm3V2sk0yyv57M26XFkF6lZPDc17OeV8AXmN0ipFCZwgLghnXpwShucUkIwI9AQvMqWyIZD-egsUMNTP1HLzIeVNJJJVagNurXQlbO8CLkN0Q85Q8XIVtKLaEOMJvJdni13sY5rr2cglupm2xrc0-f4AXvviUwriG18m6nz7BZSm1yLDcpDitb-Cy60IJvzy8jCH7l-BZb4fsX929J-D7p4_X51-a1dXnr-fLVeOoRKVprXLcc2Kls7pvNW-R5YoroZHoLW5pRynVjCHRufrjvmsxpVx3hHaub1t6At4fdHcp3k4-F7OtJ_phsKOPUzZUaSqVlBV88w-4iVMa626mmqcI14JV6O3_IFwNr7vwv5Q4UC7FnJPvzS5Vd9PeYGTmsMwxLDOHZY5h1cF3d_I2V3_7ZEcX8v00kxRheY9tconpoTihSBoihGacVGx5wMLYx7S1v2MaOlPsfojpKE0f2egP9oK0CA</recordid><startdate>20000901</startdate><enddate>20000901</enddate><creator>Duncan, George T.</creator><creator>Mukherjee, Sumitra</creator><general>Taylor &amp; Francis Group</general><general>American Statistical Association</general><general>Taylor &amp; Francis Ltd</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JRZRW</scope><scope>K30</scope><scope>PAAUG</scope><scope>PAWHS</scope><scope>PAWZZ</scope><scope>PAXOH</scope><scope>PBHAV</scope><scope>PBQSW</scope><scope>PBYQZ</scope><scope>PCIWU</scope><scope>PCMID</scope><scope>PCZJX</scope><scope>PDGRG</scope><scope>PDWWI</scope><scope>PETMR</scope><scope>PFVGT</scope><scope>PGXDX</scope><scope>PIHIL</scope><scope>PISVA</scope><scope>PJCTQ</scope><scope>PJTMS</scope><scope>PLCHJ</scope><scope>PMHAD</scope><scope>PNQDJ</scope><scope>POUND</scope><scope>PPLAD</scope><scope>PQAPC</scope><scope>PQCAN</scope><scope>PQCMW</scope><scope>PQEME</scope><scope>PQHKH</scope><scope>PQMID</scope><scope>PQNCT</scope><scope>PQNET</scope><scope>PQSCT</scope><scope>PQSET</scope><scope>PSVJG</scope><scope>PVMQY</scope><scope>PZGFC</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7X7</scope><scope>7XB</scope><scope>87Z</scope><scope>88E</scope><scope>88I</scope><scope>8AF</scope><scope>8BJ</scope><scope>8C1</scope><scope>8FE</scope><scope>8FG</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FQK</scope><scope>FRNLG</scope><scope>FYUFA</scope><scope>F~G</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JBE</scope><scope>K60</scope><scope>K6~</scope><scope>K9-</scope><scope>K9.</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0R</scope><scope>M0S</scope><scope>M0T</scope><scope>M1P</scope><scope>M2O</scope><scope>M2P</scope><scope>M7S</scope><scope>MBDVC</scope><scope>PADUT</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYYUZ</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20000901</creationdate><title>Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise</title><author>Duncan, George T. ; Mukherjee, Sumitra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c370t-ba8c5e52a7ca9fb95b0a58586906fa1b3d33394406dc1b35edb13359d23dcfbb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2000</creationdate><topic>Applications and Case Studies</topic><topic>Applied sciences</topic><topic>Autocorrelation</topic><topic>Computer database</topic><topic>Computer science; control theory; systems</topic><topic>Confidentiality</topic><topic>Correlation</topic><topic>Data access</topic><topic>Data masking</topic><topic>Data perturbation</topic><topic>Data processing. List processing. Character string processing</topic><topic>Database administration</topic><topic>Estimators</topic><topic>Exact sciences and technology</topic><topic>Information retrieval noise</topic><topic>Linear inference, regression</topic><topic>Mathematics</topic><topic>Memory organisation. Data processing</topic><topic>Noise</topic><topic>Noise control</topic><topic>Numeric databases</topic><topic>Objective functions</topic><topic>Privacy</topic><topic>Probability and statistics</topic><topic>Sciences and techniques of general use</topic><topic>Software</topic><topic>Statistical variance</topic><topic>Statistics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Duncan, George T.</creatorcontrib><creatorcontrib>Mukherjee, Sumitra</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Periodicals Index Online Segment 35</collection><collection>Periodicals Index Online</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - West</collection><collection>Primary Sources Access (Plan D) - International</collection><collection>Primary Sources Access &amp; Build (Plan A) - MEA</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - Midwest</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - Northeast</collection><collection>Primary Sources Access (Plan D) - Southeast</collection><collection>Primary Sources Access (Plan D) - North Central</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - Southeast</collection><collection>Primary Sources Access (Plan D) - South Central</collection><collection>Primary Sources Access &amp; Build (Plan A) - UK / I</collection><collection>Primary Sources Access (Plan D) - Canada</collection><collection>Primary Sources Access (Plan D) - EMEALA</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - North Central</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - South Central</collection><collection>Primary Sources Access &amp; Build (Plan A) - International</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - International</collection><collection>Primary Sources Access (Plan D) - West</collection><collection>Periodicals Index Online Segments 1-50</collection><collection>Primary Sources Access (Plan D) - APAC</collection><collection>Primary Sources Access (Plan D) - Midwest</collection><collection>Primary Sources Access (Plan D) - MEA</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - Canada</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - UK / I</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - EMEALA</collection><collection>Primary Sources Access &amp; Build (Plan A) - APAC</collection><collection>Primary Sources Access &amp; Build (Plan A) - Canada</collection><collection>Primary Sources Access &amp; Build (Plan A) - West</collection><collection>Primary Sources Access &amp; Build (Plan A) - EMEALA</collection><collection>Primary Sources Access (Plan D) - Northeast</collection><collection>Primary Sources Access &amp; Build (Plan A) - Midwest</collection><collection>Primary Sources Access &amp; Build (Plan A) - North Central</collection><collection>Primary Sources Access &amp; Build (Plan A) - Northeast</collection><collection>Primary Sources Access &amp; Build (Plan A) - South Central</collection><collection>Primary Sources Access &amp; Build (Plan A) - Southeast</collection><collection>Primary Sources Access (Plan D) - UK / I</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - APAC</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - MEA</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>Health &amp; Medical Collection (Proquest)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Medical Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>STEM Database</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>Public Health Database (Proquest)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>International Bibliography of the Social Sciences</collection><collection>Business Premium Collection (Alumni)</collection><collection>Health Research Premium Collection</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>International Bibliography of the Social Sciences</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Consumer Health Database</collection><collection>ProQuest Health &amp; Medical Complete (Alumni)</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM global</collection><collection>ProQuest Consumer Health Database</collection><collection>Health &amp; Medical Collection (Alumni Edition)</collection><collection>Health Management Database (Proquest)</collection><collection>Medical Database</collection><collection>ProQuest research library</collection><collection>ProQuest Science Journals</collection><collection>ProQuest Engineering Database</collection><collection>Research Library (Corporate)</collection><collection>Research Library China</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Journal of the American Statistical Association</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Duncan, George T.</au><au>Mukherjee, Sumitra</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise</atitle><jtitle>Journal of the American Statistical Association</jtitle><date>2000-09-01</date><risdate>2000</risdate><volume>95</volume><issue>451</issue><spage>720</spage><epage>729</epage><pages>720-729</pages><issn>0162-1459</issn><eissn>1537-274X</eissn><coden>JSTNAL</coden><abstract>Disclosure limitation methods transform statistical databases to protect confidentiality, a practical concern of statistical agencies. A statistical database responds to queries with aggregate statistics. The database administrator should maximize legitimate data access while keeping the risk of disclosure below an acceptable level. Legitimate users seek statistical information, generally in aggregate form; malicious users-the data snoopers-attempt to infer confidential information about an individual data subject. Tracker attacks are of special concern for databases accessed online. This article derives optimal disclosure limitation strategies under tracker attacks for the important case of data masking through additive noise. Operational measures of the utility of data access and of disclosure risk are developed. The utility of data access is expressed so that trade-offs can be made between the quantity and the quality of data to be released. Application is made to Ohio data from the 1990 census. The article derives conditions under which an attack by a data snooper is better thwarted by a combination of query restriction and data masking than by either disclosure limitation method separately. Data masking by independent noise addition and data perturbation are considered as extreme cases in the continuum of data masking using positively correlated additive noise. Optimal strategies are established for the data snooper. Circumstances are determined under which adding autocorrelated noise is preferable to using existing methods of either independent noise addition or data perturbation. Both moving average and autoregressive noise addition are considered.</abstract><cop>Alexandria, VA</cop><pub>Taylor &amp; Francis Group</pub><doi>10.1080/01621459.2000.10474260</doi><tpages>10</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0162-1459
ispartof Journal of the American Statistical Association, 2000-09, Vol.95 (451), p.720-729
issn 0162-1459
1537-274X
language eng
recordid cdi_proquest_miscellaneous_38937877
source Jstor Complete Legacy; Taylor & Francis Journals Complete; Periodicals Index Online; JSTOR Mathematics & Statistics Collection
subjects Applications and Case Studies
Applied sciences
Autocorrelation
Computer database
Computer science
control theory
systems
Confidentiality
Correlation
Data access
Data masking
Data perturbation
Data processing. List processing. Character string processing
Database administration
Estimators
Exact sciences and technology
Information retrieval noise
Linear inference, regression
Mathematics
Memory organisation. Data processing
Noise
Noise control
Numeric databases
Objective functions
Privacy
Probability and statistics
Sciences and techniques of general use
Software
Statistical variance
Statistics
title Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T19%3A44%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optimal%20Disclosure%20Limitation%20Strategy%20in%20Statistical%20Databases:%20Deterring%20Tracker%20Attacks%20through%20Additive%20Noise&rft.jtitle=Journal%20of%20the%20American%20Statistical%20Association&rft.au=Duncan,%20George%20T.&rft.date=2000-09-01&rft.volume=95&rft.issue=451&rft.spage=720&rft.epage=729&rft.pages=720-729&rft.issn=0162-1459&rft.eissn=1537-274X&rft.coden=JSTNAL&rft_id=info:doi/10.1080/01621459.2000.10474260&rft_dat=%3Cjstor_proqu%3E2669452%3C/jstor_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=274825964&rft_id=info:pmid/&rft_jstor_id=2669452&rfr_iscdi=true