104
Views
28
CrossRef citations to date
0
Altmetric
Application and Case Study

Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise

&
Pages 720-729 | Received 01 Nov 1995, Published online: 17 Feb 2012

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

S F Roehrig, R Padman, R Krishnan & G T Duncan. (2011) Exact and heuristic methods for cell suppression in multi-dimensional linked tables. Journal of the Operational Research Society 62:2, pages 291-304.
Read now
JeromeP. Reiter & ChristineN. Kohnen. (2005) Categorical data regression diagnostics for remote access servers. Journal of Statistical Computation and Simulation 75:11, pages 889-903.
Read now

Articles from other publishers (26)

Nicolas Gast, Stratis Ioannidis, Patrick Loiseau & Benjamin Roussillon. (2020) Linear Regression from Strategic Data Sources. ACM Transactions on Economics and Computation 8:2, pages 1-24.
Crossref
Harvey GoldsteinNatalie Shlomo. (2020) A Probabilistic Procedure for Anonymisation, for Assessing the Risk of Re-identification and for the Analysis of Perturbed Data Sets. Journal of Official Statistics 36:1, pages 89-115.
Crossref
Zhuohua Liu, Caijuan Huang, Hui Suo & Bin Yang. 2019. Artificial Intelligence and Security. Artificial Intelligence and Security 606 616 .
Alpa Kavin Shah & Ravi Gulati. 2018. Future Internet Technologies and Trends. Future Internet Technologies and Trends 28 36 .
Josep Domingo-Ferrer. 2018. Encyclopedia of Database Systems. Encyclopedia of Database Systems 1916 1920 .
Atikur R. Khan & Christine M. O'Keefe. (2017) Disclosure risk reduction for generalized linear model output in a remote analysis system. Data & Knowledge Engineering 111, pages 90-102.
Crossref
Zhan Qin, Jingbo Yan, Kui Ren, Chang Wen Chen & Cong Wang. (2016) SecSIFT. ACM Transactions on Multimedia Computing, Communications, and Applications 12:4s, pages 1-24.
Crossref
Josep Domingo-Ferrer, David Sánchez & Sara Hajian. 2015. Privacy in a Digital, Networked World. Privacy in a Digital, Networked World 9 35 .
Josep Domingo-Ferrer. 2016. Encyclopedia of Database Systems. Encyclopedia of Database Systems 1 5 .
Xiao-Bai Li & Sumit Sarkar. (2013) Class-Restricted Clustering and Microperturbation for Data Privacy. Management Science 59:4, pages 796-812.
Crossref
Stratis Ioannidis & Patrick Loiseau. 2013. Web and Internet Economics. Web and Internet Economics 277 290 .
Xiao-Bai Li & Sumit Sarkar. (2011) Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data. Information Systems Research 22:4, pages 774-789.
Crossref
Bimal Sinha, Tapan K. Nayak & Laura Zayatz. (2012) Privacy protection and quantile estimation from noise multiplied data. Sankhya B 73:2, pages 297-315.
Crossref
Jeremy J. Albright. (2011) Privacy Protection in Social Science Research: Possibilities and Impossibilities. PS: Political Science & Politics 44:4, pages 777-782.
Crossref
George Duncan & Lynne Stokes. (2009) Data masking for disclosure limitation. WIREs Computational Statistics 1:1, pages 83-92.
Crossref
Josep Domingo-Ferrer, Francesc Sebé & Agusti Solanas. (2008) A polynomial-time approximation to optimal multivariate microaggregation. Computers & Mathematics with Applications 55:4, pages 714-732.
Crossref
Manuel A. Nunez, Robert S. Garfinkel & Ram D. Gopal. (2007) Stochastic Protection of Confidential Information in Databases: A Hybrid of Data Perturbation and Query Restriction. Operations Research 55:5, pages 890-908.
Crossref
Syam Menon & Sumit Sarkar. (2007) Minimizing Information Loss and Preserving Privacy. Management Science 53:1, pages 101-116.
Crossref
Xiao-Bai Li & Sumit Sarkar. (2006) Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data. Information Systems Research 17:3, pages 254-270.
Crossref
Andrew Simpson, David Power & Mark Slaymaker. (2006) On tracker attacks in health grids. On tracker attacks in health grids.
S. Gomatam, A. F. Karr, J. P. Reiter & A. P. Sanil. (2005) Data Dissemination and Disclosure Limitation in a World Without Microdata: A Risk–Utility Framework for Remote Access Analysis Servers. Statistical Science 20:2.
Crossref
Rathindra Sarathy & Krishnamurty Muralidhar. (2002) The Security of Confidential Numerical Data in Databases. Information Systems Research 13:4, pages 389-403.
Crossref
Alexandre Evfimievski. (2002) Randomization in privacy preserving data mining. ACM SIGKDD Explorations Newsletter 4:2, pages 43-48.
Crossref
Luisa Franconi & Julian Stander. (2002) A model-based method for disclosure limitation of business microdata. Journal of the Royal Statistical Society: Series D (The Statistician) 51:1, pages 51-61.
Crossref
Alexandre Viejo & Benjamin Fabian. (2008) Returning Lethe to Aletheia? Towards Anonymity in Semantic Data Federations. SSRN Electronic Journal.
Crossref
Mark D. Flood, Jonathan Katz, Stephen J. Ong & Adam D. Smith. (2013) Cryptography and the Economics of Supervisory Information: Balancing Transparency and Confidentiality. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.