Web-Based Systems that Disseminate Information but Protect Confidential Data
نویسندگان
چکیده
We describe two Web-based query systems being developed by the National Institute of Statistical Sciences (NISS) that disseminate, in the form of statistical analyses, information derived from confidential databases, but protect the confidentiality of the data.
منابع مشابه
Web Systems That Disseminate Information But Protect Confidential Data
Statistical agencies have longstanding concern over confidentiality of their data [14, 15]. But agencies must also report information to the public. This tension between confidentiality and dissemination of statistical information is heightened by the emergence of the World Wide Web as a means of communication. On the one hand, confidentiality is threatened by advances in information technology...
متن کاملAnomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملTwo-step hierarchical scheme for detecting detoured attacks to the web server
In this paper, we propose an improved detection scheme to protect a Web server from detoured attacks, which disclose confidential/private information or disseminate malware codes through outbound traffic. Our scheme has a two-step hierarchy, whose detection methods are complementary to each other. The first step is a signature-based detector that uses Snort and detects the marks of disseminatin...
متن کاملOptimal Tabular Releases from Confidential Data
We describe and illustrate NISS-developed optimal tabular release technology, which releases sets of sub-tables of large contingency tables that maximize data utility (in our examples, the number of sub-tables released) subject to a constraint on disclosure risk (tightness of bounds on small-count, risky cells in the underlying table). This approach explicitly accommodates the mandate of Federa...
متن کاملUsing Multiple Imputation to Integrate and Disseminate Confidential Microdata
In data integration contexts, two statistical agencies seek to merge their separate databases in one file. The agencies also may seek to disseminate data to the public based on the integrated file. These goals may be complicated by the agencies’ need to protect the confidentiality of database subjects, which could be at risk during the integration or dissemination stage. This article proposes s...
متن کامل