IS

Sarathy, Rathindra

Topic Weight Topic Terms
0.208 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using
0.200 data database administration important dictionary organizations activities record increasingly method collection records considered perturbation requirements
0.185 phase study analysis business early large types phases support provided development practice effectively genres associated
0.149 security information compliance policy organizations breach disclosure policies deterrence breaches incidents results study abuse managed
0.127 database language query databases natural data queries relational processing paper using request views access use

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Muralidhar, Krishnamurty 1
Data Perturbation 1 Database Security 1 Inferential Disclosure 1 Inferential Security 1

Articles (1)

The Security of Confidential Numerical Data in Databases. (Information Systems Research, 2002)
Authors: Abstract:
    Organizations are storing large amounts of data in databases for data mining and other types of analysis. Some of this data is considered confidential and has to be protected from disclosure. When access to individual values of confidential numerical data in the database is prevented, disclosure may occur when a snooper uses linear models to predict individual values of confidential attributes using nonconfidential numerical and categorical attributes. Hence, it is important for the database administrator to have the ability to evaluate security for snoopers using linear models. In this study we provide a methodology based on Canonical Correlation Analysis that is both appropriate and adequate for evaluating security. The methodology can also be used to evaluate the security provided by different security mechanisms such as query restrictions and data perturbation. In situations where the level of security is inadequate, the methodology provided in this study can also be used to select appropriate inference control mechanisms. The application of the methodology is illustrated using a simulated database.