Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise
Disclosure limitation methods transform statistical databases to protect confidentiality, a practical concern of statistical agencies. A statistical database responds to queries with aggregate statistics. The database administrator should maximize legitimate data access while keeping the risk of dis...
Gespeichert in:
Veröffentlicht in: | Journal of the American Statistical Association 2000-09, Vol.95 (451), p.720-729 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 729 |
---|---|
container_issue | 451 |
container_start_page | 720 |
container_title | Journal of the American Statistical Association |
container_volume | 95 |
creator | Duncan, George T. Mukherjee, Sumitra |
description | Disclosure limitation methods transform statistical databases to protect confidentiality, a practical concern of statistical agencies. A statistical database responds to queries with aggregate statistics. The database administrator should maximize legitimate data access while keeping the risk of disclosure below an acceptable level. Legitimate users seek statistical information, generally in aggregate form; malicious users-the data snoopers-attempt to infer confidential information about an individual data subject. Tracker attacks are of special concern for databases accessed online. This article derives optimal disclosure limitation strategies under tracker attacks for the important case of data masking through additive noise. Operational measures of the utility of data access and of disclosure risk are developed. The utility of data access is expressed so that trade-offs can be made between the quantity and the quality of data to be released. Application is made to Ohio data from the 1990 census. The article derives conditions under which an attack by a data snooper is better thwarted by a combination of query restriction and data masking than by either disclosure limitation method separately. Data masking by independent noise addition and data perturbation are considered as extreme cases in the continuum of data masking using positively correlated additive noise. Optimal strategies are established for the data snooper. Circumstances are determined under which adding autocorrelated noise is preferable to using existing methods of either independent noise addition or data perturbation. Both moving average and autoregressive noise addition are considered. |
doi_str_mv | 10.1080/01621459.2000.10474260 |
format | Article |
fullrecord | <record><control><sourceid>jstor_proqu</sourceid><recordid>TN_cdi_proquest_miscellaneous_38937877</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>2669452</jstor_id><sourcerecordid>2669452</sourcerecordid><originalsourceid>FETCH-LOGICAL-c370t-ba8c5e52a7ca9fb95b0a58586906fa1b3d33394406dc1b35edb13359d23dcfbb3</originalsourceid><addsrcrecordid>eNqFkV1rFDEUhoMouFb_ggQV76bN94d3S-sXLO2FFbwLmUxmm3V2sk0yyv57M26XFkF6lZPDc17OeV8AXmN0ipFCZwgLghnXpwShucUkIwI9AQvMqWyIZD-egsUMNTP1HLzIeVNJJJVagNurXQlbO8CLkN0Q85Q8XIVtKLaEOMJvJdni13sY5rr2cglupm2xrc0-f4AXvviUwriG18m6nz7BZSm1yLDcpDitb-Cy60IJvzy8jCH7l-BZb4fsX929J-D7p4_X51-a1dXnr-fLVeOoRKVprXLcc2Kls7pvNW-R5YoroZHoLW5pRynVjCHRufrjvmsxpVx3hHaub1t6At4fdHcp3k4-F7OtJ_phsKOPUzZUaSqVlBV88w-4iVMa626mmqcI14JV6O3_IFwNr7vwv5Q4UC7FnJPvzS5Vd9PeYGTmsMwxLDOHZY5h1cF3d_I2V3_7ZEcX8v00kxRheY9tconpoTihSBoihGacVGx5wMLYx7S1v2MaOlPsfojpKE0f2egP9oK0CA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>274825964</pqid></control><display><type>article</type><title>Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise</title><source>Jstor Complete Legacy</source><source>Taylor & Francis Journals Complete</source><source>Periodicals Index Online</source><source>JSTOR Mathematics & Statistics Collection</source><creator>Duncan, George T. ; Mukherjee, Sumitra</creator><creatorcontrib>Duncan, George T. ; Mukherjee, Sumitra</creatorcontrib><description>Disclosure limitation methods transform statistical databases to protect confidentiality, a practical concern of statistical agencies. A statistical database responds to queries with aggregate statistics. The database administrator should maximize legitimate data access while keeping the risk of disclosure below an acceptable level. Legitimate users seek statistical information, generally in aggregate form; malicious users-the data snoopers-attempt to infer confidential information about an individual data subject. Tracker attacks are of special concern for databases accessed online. This article derives optimal disclosure limitation strategies under tracker attacks for the important case of data masking through additive noise. Operational measures of the utility of data access and of disclosure risk are developed. The utility of data access is expressed so that trade-offs can be made between the quantity and the quality of data to be released. Application is made to Ohio data from the 1990 census. The article derives conditions under which an attack by a data snooper is better thwarted by a combination of query restriction and data masking than by either disclosure limitation method separately. Data masking by independent noise addition and data perturbation are considered as extreme cases in the continuum of data masking using positively correlated additive noise. Optimal strategies are established for the data snooper. Circumstances are determined under which adding autocorrelated noise is preferable to using existing methods of either independent noise addition or data perturbation. Both moving average and autoregressive noise addition are considered.</description><identifier>ISSN: 0162-1459</identifier><identifier>EISSN: 1537-274X</identifier><identifier>DOI: 10.1080/01621459.2000.10474260</identifier><identifier>CODEN: JSTNAL</identifier><language>eng</language><publisher>Alexandria, VA: Taylor & Francis Group</publisher><subject>Applications and Case Studies ; Applied sciences ; Autocorrelation ; Computer database ; Computer science; control theory; systems ; Confidentiality ; Correlation ; Data access ; Data masking ; Data perturbation ; Data processing. List processing. Character string processing ; Database administration ; Estimators ; Exact sciences and technology ; Information retrieval noise ; Linear inference, regression ; Mathematics ; Memory organisation. Data processing ; Noise ; Noise control ; Numeric databases ; Objective functions ; Privacy ; Probability and statistics ; Sciences and techniques of general use ; Software ; Statistical variance ; Statistics</subject><ispartof>Journal of the American Statistical Association, 2000-09, Vol.95 (451), p.720-729</ispartof><rights>Copyright Taylor & Francis Group, LLC 2000</rights><rights>Copyright 2000 American Statistical Association</rights><rights>2000 INIST-CNRS</rights><rights>Copyright American Statistical Association Sep 2000</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c370t-ba8c5e52a7ca9fb95b0a58586906fa1b3d33394406dc1b35edb13359d23dcfbb3</citedby><cites>FETCH-LOGICAL-c370t-ba8c5e52a7ca9fb95b0a58586906fa1b3d33394406dc1b35edb13359d23dcfbb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/2669452$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/2669452$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>314,776,780,799,828,27846,27901,27902,57992,57996,58225,58229,59620,60409</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=1473017$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Duncan, George T.</creatorcontrib><creatorcontrib>Mukherjee, Sumitra</creatorcontrib><title>Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise</title><title>Journal of the American Statistical Association</title><description>Disclosure limitation methods transform statistical databases to protect confidentiality, a practical concern of statistical agencies. A statistical database responds to queries with aggregate statistics. The database administrator should maximize legitimate data access while keeping the risk of disclosure below an acceptable level. Legitimate users seek statistical information, generally in aggregate form; malicious users-the data snoopers-attempt to infer confidential information about an individual data subject. Tracker attacks are of special concern for databases accessed online. This article derives optimal disclosure limitation strategies under tracker attacks for the important case of data masking through additive noise. Operational measures of the utility of data access and of disclosure risk are developed. The utility of data access is expressed so that trade-offs can be made between the quantity and the quality of data to be released. Application is made to Ohio data from the 1990 census. The article derives conditions under which an attack by a data snooper is better thwarted by a combination of query restriction and data masking than by either disclosure limitation method separately. Data masking by independent noise addition and data perturbation are considered as extreme cases in the continuum of data masking using positively correlated additive noise. Optimal strategies are established for the data snooper. Circumstances are determined under which adding autocorrelated noise is preferable to using existing methods of either independent noise addition or data perturbation. Both moving average and autoregressive noise addition are considered.</description><subject>Applications and Case Studies</subject><subject>Applied sciences</subject><subject>Autocorrelation</subject><subject>Computer database</subject><subject>Computer science; control theory; systems</subject><subject>Confidentiality</subject><subject>Correlation</subject><subject>Data access</subject><subject>Data masking</subject><subject>Data perturbation</subject><subject>Data processing. List processing. Character string processing</subject><subject>Database administration</subject><subject>Estimators</subject><subject>Exact sciences and technology</subject><subject>Information retrieval noise</subject><subject>Linear inference, regression</subject><subject>Mathematics</subject><subject>Memory organisation. Data processing</subject><subject>Noise</subject><subject>Noise control</subject><subject>Numeric databases</subject><subject>Objective functions</subject><subject>Privacy</subject><subject>Probability and statistics</subject><subject>Sciences and techniques of general use</subject><subject>Software</subject><subject>Statistical variance</subject><subject>Statistics</subject><issn>0162-1459</issn><issn>1537-274X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2000</creationdate><recordtype>article</recordtype><sourceid>K30</sourceid><sourceid>8G5</sourceid><sourceid>BENPR</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNqFkV1rFDEUhoMouFb_ggQV76bN94d3S-sXLO2FFbwLmUxmm3V2sk0yyv57M26XFkF6lZPDc17OeV8AXmN0ipFCZwgLghnXpwShucUkIwI9AQvMqWyIZD-egsUMNTP1HLzIeVNJJJVagNurXQlbO8CLkN0Q85Q8XIVtKLaEOMJvJdni13sY5rr2cglupm2xrc0-f4AXvviUwriG18m6nz7BZSm1yLDcpDitb-Cy60IJvzy8jCH7l-BZb4fsX929J-D7p4_X51-a1dXnr-fLVeOoRKVprXLcc2Kls7pvNW-R5YoroZHoLW5pRynVjCHRufrjvmsxpVx3hHaub1t6At4fdHcp3k4-F7OtJ_phsKOPUzZUaSqVlBV88w-4iVMa626mmqcI14JV6O3_IFwNr7vwv5Q4UC7FnJPvzS5Vd9PeYGTmsMwxLDOHZY5h1cF3d_I2V3_7ZEcX8v00kxRheY9tconpoTihSBoihGacVGx5wMLYx7S1v2MaOlPsfojpKE0f2egP9oK0CA</recordid><startdate>20000901</startdate><enddate>20000901</enddate><creator>Duncan, George T.</creator><creator>Mukherjee, Sumitra</creator><general>Taylor & Francis Group</general><general>American Statistical Association</general><general>Taylor & Francis Ltd</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JRZRW</scope><scope>K30</scope><scope>PAAUG</scope><scope>PAWHS</scope><scope>PAWZZ</scope><scope>PAXOH</scope><scope>PBHAV</scope><scope>PBQSW</scope><scope>PBYQZ</scope><scope>PCIWU</scope><scope>PCMID</scope><scope>PCZJX</scope><scope>PDGRG</scope><scope>PDWWI</scope><scope>PETMR</scope><scope>PFVGT</scope><scope>PGXDX</scope><scope>PIHIL</scope><scope>PISVA</scope><scope>PJCTQ</scope><scope>PJTMS</scope><scope>PLCHJ</scope><scope>PMHAD</scope><scope>PNQDJ</scope><scope>POUND</scope><scope>PPLAD</scope><scope>PQAPC</scope><scope>PQCAN</scope><scope>PQCMW</scope><scope>PQEME</scope><scope>PQHKH</scope><scope>PQMID</scope><scope>PQNCT</scope><scope>PQNET</scope><scope>PQSCT</scope><scope>PQSET</scope><scope>PSVJG</scope><scope>PVMQY</scope><scope>PZGFC</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7X7</scope><scope>7XB</scope><scope>87Z</scope><scope>88E</scope><scope>88I</scope><scope>8AF</scope><scope>8BJ</scope><scope>8C1</scope><scope>8FE</scope><scope>8FG</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FQK</scope><scope>FRNLG</scope><scope>FYUFA</scope><scope>F~G</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JBE</scope><scope>K60</scope><scope>K6~</scope><scope>K9-</scope><scope>K9.</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0R</scope><scope>M0S</scope><scope>M0T</scope><scope>M1P</scope><scope>M2O</scope><scope>M2P</scope><scope>M7S</scope><scope>MBDVC</scope><scope>PADUT</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYYUZ</scope><scope>Q9U</scope><scope>S0X</scope></search><sort><creationdate>20000901</creationdate><title>Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise</title><author>Duncan, George T. ; Mukherjee, Sumitra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c370t-ba8c5e52a7ca9fb95b0a58586906fa1b3d33394406dc1b35edb13359d23dcfbb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2000</creationdate><topic>Applications and Case Studies</topic><topic>Applied sciences</topic><topic>Autocorrelation</topic><topic>Computer database</topic><topic>Computer science; control theory; systems</topic><topic>Confidentiality</topic><topic>Correlation</topic><topic>Data access</topic><topic>Data masking</topic><topic>Data perturbation</topic><topic>Data processing. List processing. Character string processing</topic><topic>Database administration</topic><topic>Estimators</topic><topic>Exact sciences and technology</topic><topic>Information retrieval noise</topic><topic>Linear inference, regression</topic><topic>Mathematics</topic><topic>Memory organisation. Data processing</topic><topic>Noise</topic><topic>Noise control</topic><topic>Numeric databases</topic><topic>Objective functions</topic><topic>Privacy</topic><topic>Probability and statistics</topic><topic>Sciences and techniques of general use</topic><topic>Software</topic><topic>Statistical variance</topic><topic>Statistics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Duncan, George T.</creatorcontrib><creatorcontrib>Mukherjee, Sumitra</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Periodicals Index Online Segment 35</collection><collection>Periodicals Index Online</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - West</collection><collection>Primary Sources Access (Plan D) - International</collection><collection>Primary Sources Access & Build (Plan A) - MEA</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - Midwest</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - Northeast</collection><collection>Primary Sources Access (Plan D) - Southeast</collection><collection>Primary Sources Access (Plan D) - North Central</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - Southeast</collection><collection>Primary Sources Access (Plan D) - South Central</collection><collection>Primary Sources Access & Build (Plan A) - UK / I</collection><collection>Primary Sources Access (Plan D) - Canada</collection><collection>Primary Sources Access (Plan D) - EMEALA</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - North Central</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - South Central</collection><collection>Primary Sources Access & Build (Plan A) - International</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - International</collection><collection>Primary Sources Access (Plan D) - West</collection><collection>Periodicals Index Online Segments 1-50</collection><collection>Primary Sources Access (Plan D) - APAC</collection><collection>Primary Sources Access (Plan D) - Midwest</collection><collection>Primary Sources Access (Plan D) - MEA</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - Canada</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - UK / I</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - EMEALA</collection><collection>Primary Sources Access & Build (Plan A) - APAC</collection><collection>Primary Sources Access & Build (Plan A) - Canada</collection><collection>Primary Sources Access & Build (Plan A) - West</collection><collection>Primary Sources Access & Build (Plan A) - EMEALA</collection><collection>Primary Sources Access (Plan D) - Northeast</collection><collection>Primary Sources Access & Build (Plan A) - Midwest</collection><collection>Primary Sources Access & Build (Plan A) - North Central</collection><collection>Primary Sources Access & Build (Plan A) - Northeast</collection><collection>Primary Sources Access & Build (Plan A) - South Central</collection><collection>Primary Sources Access & Build (Plan A) - Southeast</collection><collection>Primary Sources Access (Plan D) - UK / I</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - APAC</collection><collection>Primary Sources Access—Foundation Edition (Plan E) - MEA</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>Health & Medical Collection (Proquest)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Medical Database (Alumni Edition)</collection><collection>Science Database (Alumni Edition)</collection><collection>STEM Database</collection><collection>International Bibliography of the Social Sciences (IBSS)</collection><collection>Public Health Database (Proquest)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>International Bibliography of the Social Sciences</collection><collection>Business Premium Collection (Alumni)</collection><collection>Health Research Premium Collection</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>International Bibliography of the Social Sciences</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Consumer Health Database</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM global</collection><collection>ProQuest Consumer Health Database</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Health Management Database (Proquest)</collection><collection>Medical Database</collection><collection>ProQuest research library</collection><collection>ProQuest Science Journals</collection><collection>ProQuest Engineering Database</collection><collection>Research Library (Corporate)</collection><collection>Research Library China</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><collection>SIRS Editorial</collection><jtitle>Journal of the American Statistical Association</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Duncan, George T.</au><au>Mukherjee, Sumitra</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise</atitle><jtitle>Journal of the American Statistical Association</jtitle><date>2000-09-01</date><risdate>2000</risdate><volume>95</volume><issue>451</issue><spage>720</spage><epage>729</epage><pages>720-729</pages><issn>0162-1459</issn><eissn>1537-274X</eissn><coden>JSTNAL</coden><abstract>Disclosure limitation methods transform statistical databases to protect confidentiality, a practical concern of statistical agencies. A statistical database responds to queries with aggregate statistics. The database administrator should maximize legitimate data access while keeping the risk of disclosure below an acceptable level. Legitimate users seek statistical information, generally in aggregate form; malicious users-the data snoopers-attempt to infer confidential information about an individual data subject. Tracker attacks are of special concern for databases accessed online. This article derives optimal disclosure limitation strategies under tracker attacks for the important case of data masking through additive noise. Operational measures of the utility of data access and of disclosure risk are developed. The utility of data access is expressed so that trade-offs can be made between the quantity and the quality of data to be released. Application is made to Ohio data from the 1990 census. The article derives conditions under which an attack by a data snooper is better thwarted by a combination of query restriction and data masking than by either disclosure limitation method separately. Data masking by independent noise addition and data perturbation are considered as extreme cases in the continuum of data masking using positively correlated additive noise. Optimal strategies are established for the data snooper. Circumstances are determined under which adding autocorrelated noise is preferable to using existing methods of either independent noise addition or data perturbation. Both moving average and autoregressive noise addition are considered.</abstract><cop>Alexandria, VA</cop><pub>Taylor & Francis Group</pub><doi>10.1080/01621459.2000.10474260</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0162-1459 |
ispartof | Journal of the American Statistical Association, 2000-09, Vol.95 (451), p.720-729 |
issn | 0162-1459 1537-274X |
language | eng |
recordid | cdi_proquest_miscellaneous_38937877 |
source | Jstor Complete Legacy; Taylor & Francis Journals Complete; Periodicals Index Online; JSTOR Mathematics & Statistics Collection |
subjects | Applications and Case Studies Applied sciences Autocorrelation Computer database Computer science control theory systems Confidentiality Correlation Data access Data masking Data perturbation Data processing. List processing. Character string processing Database administration Estimators Exact sciences and technology Information retrieval noise Linear inference, regression Mathematics Memory organisation. Data processing Noise Noise control Numeric databases Objective functions Privacy Probability and statistics Sciences and techniques of general use Software Statistical variance Statistics |
title | Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T19%3A44%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Optimal%20Disclosure%20Limitation%20Strategy%20in%20Statistical%20Databases:%20Deterring%20Tracker%20Attacks%20through%20Additive%20Noise&rft.jtitle=Journal%20of%20the%20American%20Statistical%20Association&rft.au=Duncan,%20George%20T.&rft.date=2000-09-01&rft.volume=95&rft.issue=451&rft.spage=720&rft.epage=729&rft.pages=720-729&rft.issn=0162-1459&rft.eissn=1537-274X&rft.coden=JSTNAL&rft_id=info:doi/10.1080/01621459.2000.10474260&rft_dat=%3Cjstor_proqu%3E2669452%3C/jstor_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=274825964&rft_id=info:pmid/&rft_jstor_id=2669452&rfr_iscdi=true |