A new auditing scheme for securing statistical databases
A statistical database (SDB) is a database that is used to provide statistical queries (such as sum, average). Sometimes, by stitching the answers of some statistics, a malicious user (snooper) may be able to deduce confidential information about some individuals. New auditing scheme is proposed to...
| Main Authors: | P.D.D., Dominic, Elshiekh A.A., Elshiekh |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/131/ http://scholars.utp.edu.my/id/eprint/131/1/paper.pdf |
Similar Items
Three audit stages for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
Cost estimation for the key representation auditing scheme
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
Efficient algorithms for the key representation auditing scheme.
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
A multi-agent based replication strategy for improving availability and maintaining consistency of data in large scale mobile traffic control environments
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
A SCM framework to describe CRM
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
Modelling of single sourcing, multiperiod, multivendor, multibuyer based VMI
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
A decision support system for performance appraisal
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
Multiattribute analysis of the offshore outsourcing location decision using a decision support system framework
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
A hybrid decision model for the selection of capital equipment using AHP in conjoint analysis under fuzziness
by: P.D.D., Dominic, et al.
Published: (2009)
by: P.D.D., Dominic, et al.
Published: (2009)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
A New Hybrid Model Based Decision Support System For Supplier Selection Process: A Case Study from Purchasing Department, UTP
by: Ariff, Abdel Whab Ali Elhaj, et al.
Published: (2009)
by: Ariff, Abdel Whab Ali Elhaj, et al.
Published: (2009)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
A Comparative Study of FP-growth Variations
by: Aiman Moyaid, Said, et al.
Published: (2009)
by: Aiman Moyaid, Said, et al.
Published: (2009)
Decision Support System Framework for Implementation of Enterprise Resource Planning (ERP) System
by: Khalil, M.A.T., et al.
Published: (2010)
by: Khalil, M.A.T., et al.
Published: (2010)
The Role of Factors in Business-to-Business E-Procurement Implementation
by: Naseebullah, M., et al.
Published: (2010)
by: Naseebullah, M., et al.
Published: (2010)
A Binary Replication Strategy for Large-scale Mobile Environments
by: Ashraf Ahmed , Fadelelmoula, et al.
Published: (2009)
by: Ashraf Ahmed , Fadelelmoula, et al.
Published: (2009)
VAP Code: A Secure Graphical Password Scheme for Smart Devices
by: Azad, Saiful, et al.
Published: (2016)
by: Azad, Saiful, et al.
Published: (2016)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
Recommending database query terms for mobile phone users
by: R., Ahmad, et al.
Published: (2008)
by: R., Ahmad, et al.
Published: (2008)
New statistical Binary Random Test
by: Taha, Imad, et al.
Published: (2006)
by: Taha, Imad, et al.
Published: (2006)
A free-form database query language for mobile phones
by: R., Ahmad, et al.
Published: (2009)
by: R., Ahmad, et al.
Published: (2009)
SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs
by: Boubiche, Djallel Eddine, et al.
Published: (2015)
by: Boubiche, Djallel Eddine, et al.
Published: (2015)
Sequential pattern mining using PrefixSpan with pseudoprojection and separator database
by: Saputra, D., et al.
Published: (2008)
by: Saputra, D., et al.
Published: (2008)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Fingerprint database
by: Nur Amira, Ariffin
Published: (2015)
by: Nur Amira, Ariffin
Published: (2015)
Construction of zoonosis domain relationship as a preliminary stage for developing a zoonosis emerging system
by: D.R.A., Rambli, et al.
Published: (2008)
by: D.R.A., Rambli, et al.
Published: (2008)
Going Native: Native XML Database vs. Relational Database
by: Lazim, Raghad Yaseen, et al.
Published: (2012)
by: Lazim, Raghad Yaseen, et al.
Published: (2012)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
Security Management Model for Mobile Databases Transaction Management
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
Mining sequence of event from vector-based spatiotemporal database
by: B.Y., Widodo
Published: (2007)
by: B.Y., Widodo
Published: (2007)
The development of semantic meta-database: an ontology based semantic integration of biological databases
by: Samsudin, Ruhaidah, et al.
Published: (2007)
by: Samsudin, Ruhaidah, et al.
Published: (2007)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
A Case Study of Linear Weightage Model for Supplier Selection Process
by: Ali, A.A., et al.
Published: (2008)
by: Ali, A.A., et al.
Published: (2008)
Reference scheme reduction on subtypes in ORM
by: Carver, Andy, et al.
Published: (2013)
by: Carver, Andy, et al.
Published: (2013)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Inference networks for molecular database similarity searching
by: Abdo, Ammar, et al.
Published: (2008)
by: Abdo, Ammar, et al.
Published: (2008)
BVAGQ-AR for Fragmented Database Replication Management
by: N., Ahmad, et al.
Published: (2021)
by: N., Ahmad, et al.
Published: (2021)
The Application of Fragmentation Techniques on Distributed Database: An Overview
by: Sharifah Hafizah, Sy Ahmad Ubaidillah, et al.
Published: (2017)
by: Sharifah Hafizah, Sy Ahmad Ubaidillah, et al.
Published: (2017)
Mining association rule from large databases.
by: Defit, Sarjon, et al.
Published: (2001)
by: Defit, Sarjon, et al.
Published: (2001)
Similar Items
-
Three audit stages for securing statistical databases
by: P.D.D., Dominic, et al.
Published: (2009) -
Cost estimation for the key representation auditing scheme
by: P.D.D., Dominic, et al.
Published: (2009) -
Efficient algorithms for the key representation auditing scheme.
by: Asim Abdallah, Elshiekh, et al.
Published: (2009) -
A multi-agent based replication strategy for improving availability and maintaining consistency of data in large scale mobile traffic control environments
by: P.D.D., Dominic, et al.
Published: (2008) -
A SCM framework to describe CRM
by: P.D.D., Dominic, et al.
Published: (2008)