Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/63415
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Brankovic, Ljiljana | en |
dc.contributor.author | Miller, Mirka | en |
dc.contributor.author | Siran, Jozef | en |
local.source.editor | Editor(s): Rodney Topor | en |
dc.date.accessioned | 2024-10-10T22:16:21Z | - |
dc.date.available | 2024-10-10T22:16:21Z | - |
dc.date.issued | 1996-01 | - |
dc.identifier.citation | Proceedings of the Seventh Australasian Database Conference (ADC'96), Australian Computer Science Communications, 18(2), p. 177-184 | en |
dc.identifier.issn | 0157-3055 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/63415 | - |
dc.description.abstract | <p>In this paper we consider the applicability of an auditing method for preventing a statistical database compromise. In 1982 Chin and Oszoyoglu proposed Audit Expert for the prevention of database compromise using SUM queries. As originally proposed, Audit Expert was meant to be used dynamically and it was considered suitable only for small databases. In the static mode Audit Expert is much more efficient both in the storage and time required and so can be used for large databases as well as small ones. Moreover, in static mode it is possible to achieve maximum usability of the database. However, sometimes this will prevent the system from answering queries which are particularly important. In this paper we consider the inclusion of a limited number of user-posed queries and its impact on the usability. Then we say that the Audit Expert is used in a hybrid mode. We prove that mazimising usability in a general hybrid Audit Expert is NP-complete and isolate certain restricted cases when maximising usability is polynomial.</p> | en |
dc.language | en | en |
dc.publisher | Australian Computer Science Communications | en |
dc.relation.ispartof | Proceedings of the Seventh Australasian Database Conference (ADC'96), Australian Computer Science Communications | en |
dc.title | Towards a Practical Auditing Method for the Prevention of Statistical Database Compromise | en |
dc.type | Conference Publication | en |
dc.relation.conference | ADC 1996: Seventh Australasian Database Conference (ADC'96) | en |
local.contributor.firstname | Ljiljana | en |
local.contributor.firstname | Mirka | en |
local.contributor.firstname | Jozef | en |
local.profile.school | School of Science and Technology | en |
local.profile.email | lbrankov@une.edu.au | en |
local.output.category | E1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.date.conference | 29th -30th January, 1996 | en |
local.conference.place | Melbourne, Australia | en |
local.publisher.place | Australia | en |
local.format.startpage | 177 | en |
local.format.endpage | 184 | en |
local.peerreviewed | Yes | en |
local.identifier.volume | 18 | en |
local.identifier.issue | 2 | en |
local.contributor.lastname | Brankovic | en |
local.contributor.lastname | Miller | en |
local.contributor.lastname | Siran | en |
dc.identifier.staff | une-id:lbrankov | en |
local.profile.orcid | 0000-0002-5056-4627 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/63415 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Towards a Practical Auditing Method for the Prevention of Statistical Database Compromise | en |
local.output.categorydescription | E1 Refereed Scholarly Conference Publication | en |
local.conference.details | ADC 1996: Seventh Australasian Database Conference (ADC'96), Melbourne, Australia, 29th -30th January, 1996 | en |
local.search.author | Brankovic, Ljiljana | en |
local.search.author | Miller, Mirka | en |
local.search.author | Siran, Jozef | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.published | 1996 | en |
local.fileurl.closedpublished | https://rune.une.edu.au/web/retrieve/24140125-c727-4e56-aa49-76a7aabc04d2 | en |
local.subject.for2020 | 460402 Data and information privacy | en |
local.subject.for2020 | 490404 Combinatorics and discrete mathematics (excl. physical combinatorics) | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.date.start | 1996-01-29 | - |
local.date.end | 1996-01-30 | - |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Conference Publication School of Science and Technology |
Files in This Item:
File | Description | Size | Format |
---|
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.