2012
DOI: 10.1016/j.ins.2011.12.020
|View full text |Cite
|
Sign up to set email alerts
|

Limiting disclosure of sensitive data in sequential releases of databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
61
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 44 publications
(62 citation statements)
references
References 35 publications
1
61
0
Order By: Relevance
“…The two main scenarios of multiple releases of a given table are the following (see [9]): (a) The scenario of sequential release publishing [28,32], where different (vertical) projections of a given table on different subsets of attributes are released in a sequential manner; and (b) Continuous data publishing [1,3,10,25,28,35,37], in which the underlying table changes over time (e.g., tuples are added, removed, or updated), and updated snapshots of the table are released over time.…”
Section: Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The two main scenarios of multiple releases of a given table are the following (see [9]): (a) The scenario of sequential release publishing [28,32], where different (vertical) projections of a given table on different subsets of attributes are released in a sequential manner; and (b) Continuous data publishing [1,3,10,25,28,35,37], in which the underlying table changes over time (e.g., tuples are added, removed, or updated), and updated snapshots of the table are released over time.…”
Section: Overviewmentioning
confidence: 99%
“…The goal is to protect the private information from adversaries who examine the entire sequential release. That scenario was studied in [32] and was further investigated in [28]. We revisit their privacy definitions, and suggest a significantly stronger adversarial assumption and privacy definition.…”
mentioning
confidence: 99%
“…We also assume that the adversary acquired this knowledge for all data subjects in the table T ; as stated earlier, such a strong assumption is also very common, e.g. [20,35,50,51,56,61,62]. Hence, the adversary has, on one hand, the projection of T onto its first M attributes, and on the other hand the published table T in which the first M attributes are perturbed, and it includes additional L attributes that could be sensitive.…”
Section: Classical Utility and Privacy Measuresmentioning
confidence: 99%
“…For the sake of achieving a better privacy guarantee, a more widely accepted adversarial assumption (see, e.g. [20,35,50,51,56,61,62]) is a stronger one: the adversary knows the set of individuals who contributed their information to the database and was able to extract their quasi-identifier information from publicly available databases. Such an adversary knows the projection of T on its quasi-identifier attributes.…”
Section: A Global Dbrl Disclosure Risk Measurementioning
confidence: 99%
See 1 more Smart Citation