2008 International Symposium on Information Technology 2008
DOI: 10.1109/itsim.2008.4631562
|View full text |Cite
|
Sign up to set email alerts
|

A new auditing scheme for securing statistical databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2009
2009
2011
2011

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…As a continuation to the previous work of the authors [4] [5], this paper proceeds with the presentation of an auditing method that can be used to repel the attacks of the snooper to the confidentiality of the individual data in the SDB. We propose three audit stages to protect online and dynamic SDBs from being disclosed.…”
Section: Audit Stagesmentioning
confidence: 97%
See 3 more Smart Citations
“…As a continuation to the previous work of the authors [4] [5], this paper proceeds with the presentation of an auditing method that can be used to repel the attacks of the snooper to the confidentiality of the individual data in the SDB. We propose three audit stages to protect online and dynamic SDBs from being disclosed.…”
Section: Audit Stagesmentioning
confidence: 97%
“…Each employee is classified in three categories and has one data attribute. The possible category attributes' values are as follows: Table II shows the key representation database (KRDB) D \ [4], which the conversion result of the original database D by converting the three category attributes (Gender, Dept, Level) into one cell (U i1 U i2 U i3 ), and the data attribute value V i1 will be separated by the sign '.'. The converted two cells are as following:…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Query auditing was introduced in 1976 [12], [20] to check for possible compromises when a database is queried or shared. It remains an active research area [8] [7] [18] [15]. Unlike this work, most work in this area focuses on protecting privacy of entries in a database when aggregate statistical queries such as mean, sum and max are allowed over the whole database.…”
Section: Related Workmentioning
confidence: 99%