Logical vs. Numerical inference on statistical databases

  • S. D. Chowdhury
  • , G. T. Duncan
  • , R. Krishnan
  • , S. Roehrig
  • , S. Mukherjee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

As computer databases have become more prevalent and comprehensive, they have prompted concerns about the confidentiality of sensitive information. Database administrators require effective policies to guard against disclosure of confidential information while at the same time providing reasonable access to legitimate users. A general method is available for determining if disclosure of sensitive information may result from inference over multiple database tables. This method relies on the logical structure of the tables, and is thus independent of the actual contents. After reviewing this method, we present new numerical techniques which in some cases allow inference of sensitive data even in instances pronounced safe by the logical method. These new techniques exploit the contents of the tables, and one makes use of a pair of new matrix operators. A real-world example of a multi-table inference process is given.

Original languageEnglish
Title of host publicationInformation Systems - Decision Support and Knowledge-Based Systems
PublisherIEEE Computer Society
Pages3-10
Number of pages8
ISBN (Electronic)0818673249
DOIs
StatePublished - 1996
Externally publishedYes
Event29th Hawaii International Conference on System Sciences, HICSS 1996 - Wailea, United States
Duration: Jan 3 1996Jan 6 1996

Publication series

NameProceedings of the Annual Hawaii International Conference on System Sciences
Volume2
ISSN (Print)1530-1605

Conference

Conference29th Hawaii International Conference on System Sciences, HICSS 1996
Country/TerritoryUnited States
CityWailea
Period1/3/961/6/96

Bibliographical note

Publisher Copyright:
© 1996 IEEE.

ASJC Scopus Subject Areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Logical vs. Numerical inference on statistical databases'. Together they form a unique fingerprint.

Cite this