This article gives a survey of combinatorial algorithms and methods for database security related to the work of Mirka Miller. The main contributions of Mirka Miller and coauthors to the security of statistical databases include the introduction of Static Audit Expert and theorems determining time complexity of its combinatorial algorithms, a polynomial time algorithm for deciding whether the maximum possible usability can be achieved in statistical database with a special class of answerable statistics, NP-completeness of similar problems concerning several other types of databases, sharp upper bounds on the number of compromise-free queries in certain categories of statistical databases, and analogous results on applications of Static Aud...
This paper proposes a statistical perturbation scheme to protect a statistical database against caDp...
A database is compromised if a user can determine the data elements associated with keys which he di...
Although Artificial Intelligent (AI) techniques have been used in various applications, their use in...
This article gives a survey of combinatorial algorithms and methods for database security related to...
This article gives a survey of discrete and combinatorial algorithms and methods for database securi...
The security problem of statistical databases containing anonymous but individual records which may ...
We study the problem of auditing databases which sup-port statistical sum queries to protect the sec...
AbstractWe study the problem of auditing databases which support statistical sum queries to protect ...
This paper considers the problem of providing security to statistical databases against disclosure o...
Research in Controlling Inference in statistical databases (SDBs) has been under way for over 20 yea...
We study the computational complexity of auditing finite attributes in databases allowing statistica...
In response to queries asked to a statistical database, the query system should avoid releasing summ...
Statistical database security focuses on the protection of confidential individual values stored in ...
The basic inference problem is defined as follows: For a finite set X equals left brace x//1,. . . ,...
This paper surveys the fields of Statistical Disclosure Control (SDC) and Micro-Aggregation Techniqu...
This paper proposes a statistical perturbation scheme to protect a statistical database against caDp...
A database is compromised if a user can determine the data elements associated with keys which he di...
Although Artificial Intelligent (AI) techniques have been used in various applications, their use in...
This article gives a survey of combinatorial algorithms and methods for database security related to...
This article gives a survey of discrete and combinatorial algorithms and methods for database securi...
The security problem of statistical databases containing anonymous but individual records which may ...
We study the problem of auditing databases which sup-port statistical sum queries to protect the sec...
AbstractWe study the problem of auditing databases which support statistical sum queries to protect ...
This paper considers the problem of providing security to statistical databases against disclosure o...
Research in Controlling Inference in statistical databases (SDBs) has been under way for over 20 yea...
We study the computational complexity of auditing finite attributes in databases allowing statistica...
In response to queries asked to a statistical database, the query system should avoid releasing summ...
Statistical database security focuses on the protection of confidential individual values stored in ...
The basic inference problem is defined as follows: For a finite set X equals left brace x//1,. . . ,...
This paper surveys the fields of Statistical Disclosure Control (SDC) and Micro-Aggregation Techniqu...
This paper proposes a statistical perturbation scheme to protect a statistical database against caDp...
A database is compromised if a user can determine the data elements associated with keys which he di...
Although Artificial Intelligent (AI) techniques have been used in various applications, their use in...