| 期刊論文1. | Hoffman, L. J.、Miller, W. F.(1970)。Getting a personal dossier from a statistical data bank。Datamation,16(5),74-75。 | 2. | Schlorer, J.(1975)。Identification and retrieval of personal records from a statistical data bank。Methods of Information in Medicine,14(1),7-13。 | 3. | Denning, D. E.、Denning, P. J.、Schwartz, M. D.(1979)。The tracker: a threat to statistical database security。ACM Transactions on Database Systems (TODS),4(1),76-96。 | 4. | Dobkin, D.、Jones, A. K.、Lipion, R. J.(1979)。Secure databases: protection against user influence。ACM Transactions on Database Systems (TODS),4(1),97-106。 | 5. | Davida, G. I.(1978)。Database Security。IEEE Transactions on Software Engineering,SE-4(6),531-533。 | 6. | DeMillo, R. A.、Dobkin, D.、Lipton, R. J.(1978)。Even Data Bases That Lie Can Be Compromised。IEEE Transactions on Software Engineering,SE-4(1),73-75。 | 7. | Karpinski, R. H.(1970)。Reply to Hoffman and Shaw。Datamation,16(10)。 | 8. | Fellegi, I. P.(1972)。On the Question of Statistical Confidentiality。Journal of the American Statistical Association,67(337),7-18。 | 會議論文1. | Hansen, M. H.(1971)。Insuring confidentiality of individual records in data storage and retrieval for statistical purposes579--585。 | 2. | Nargundkar, M. S.、Saveland, W.(1972)。Random rounding to prevent statistical disclosure。American Statistical Association。382--385。 | 3. | Reed. I. S.(1973)。Information theory and privacy in data banks581--587。 | 4. | Yu, C. T.、Chin, F. Y.(1977)。A Study on the Protection of Statistical Data Bases169-179。 | 研究報告1. | Kam, J. B.、Ullman, J. D.(1976)。A Model of Statistical Data Bases and their Security。EECS Department, Princeton University。 | 圖書1. | Hoffman, L. J.(1977)。Modern Methods for Computer Security and Privacy。Englewood Cliffs, N.J.:Prentice-Hall。 | |