Overview
- First book that concentrates solely on OLAP systems
- Includes Lattice-Based Inference Control Method
- Discusses methods that can be implemented on the basis of \emph(three-Tier) Inference control model in OLAP systems
- Includes supplementary material: sn.pub/extras
Part of the book series: Advances in Information Security (ADIS, volume 29)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (9 chapters)
Keywords
About this book
Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. This volume reviews a series of methods that can precisely answer data cube-style OLAP, regarding sensitive data while provably preventing adversaries from inferring data.
Preserving Privacy for On-Line Analytical Processing is appropriate for practitioners in industry as well as graduate-level students in computer science and engineering.
Authors and Affiliations
Bibliographic Information
Book Title: Preserving Privacy in On-Line Analytical Processing (OLAP)
Authors: Lingyu Wang, Sushil Jajodia, Duminda Wijesekera
Series Title: Advances in Information Security
DOI: https://doi.org/10.1007/978-0-387-46274-5
Publisher: Springer New York, NY
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag US 2007
Hardcover ISBN: 978-0-387-46273-8Published: 14 November 2006
Softcover ISBN: 978-1-4419-4278-4Published: 19 November 2010
eBook ISBN: 978-0-387-46274-5Published: 06 April 2007
Series ISSN: 1568-2633
Series E-ISSN: 2512-2193
Edition Number: 1
Number of Pages: XII, 180
Number of Illustrations: 20 b/w illustrations
Topics: Data Structures and Information Theory, Cryptology, Database Management, Information Systems Applications (incl. Internet), Computer Communication Networks