Adam et al, “Security-control methods for statistical databases: A comparative study”, ACM Computing Surveys, vol.21, No.4, pp. 516-556, Dec. 1989.* |
Tendick et al., “A modified random perturbation method for database security”, ACM, vol.19, No.1, PP. 48-63, Mar. 1994.* |
Muralidhar et al., Security of Random data perturbation methods, ACM, vol.24, No.4, pp. 487-493, Dec. 1999.* |
Traub et al., “The statistical security of a Statistical database”, ACM, vol.9, No.4, pp. 672-679, Dec. 1984.* |
Palley et al., “The use of regression methodology for the compromise of confidential information in statistical databases”, ACM, vol.12, No.4, pp.593-608, Dec. 1987. |