Web-Based Systems that Disseminate Information but Protect Confidential Data

نویسندگان

  • Alan F. Karr
  • Ashish P. Sanil
چکیده

We describe two Web-based query systems being developed by the National Institute of Statistical Sciences (NISS) that disseminate, in the form of statistical analyses, information derived from confidential databases, but protect the confidentiality of the data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Web Systems That Disseminate Information But Protect Confidential Data

Statistical agencies have longstanding concern over confidentiality of their data [14, 15]. But agencies must also report information to the public. This tension between confidentiality and dissemination of statistical information is heightened by the emergence of the World Wide Web as a means of communication. On the one hand, confidentiality is threatened by advances in information technology...

متن کامل

Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism

Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...

متن کامل

Two-step hierarchical scheme for detecting detoured attacks to the web server

In this paper, we propose an improved detection scheme to protect a Web server from detoured attacks, which disclose confidential/private information or disseminate malware codes through outbound traffic. Our scheme has a two-step hierarchy, whose detection methods are complementary to each other. The first step is a signature-based detector that uses Snort and detects the marks of disseminatin...

متن کامل

Optimal Tabular Releases from Confidential Data

We describe and illustrate NISS-developed optimal tabular release technology, which releases sets of sub-tables of large contingency tables that maximize data utility (in our examples, the number of sub-tables released) subject to a constraint on disclosure risk (tightness of bounds on small-count, risky cells in the underlying table). This approach explicitly accommodates the mandate of Federa...

متن کامل

Using Multiple Imputation to Integrate and Disseminate Confidential Microdata

In data integration contexts, two statistical agencies seek to merge their separate databases in one file. The agencies also may seek to disseminate data to the public based on the integrated file. These goals may be complicated by the agencies’ need to protect the confidentiality of database subjects, which could be at risk during the integration or dissemination stage. This article proposes s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001