Access the full text.
Sign up today, get DeepDyve free for 14 days.
(1995)
Education issues in health informatics
L. Brankovic, Mirka Miller, J. Širáň (2002)
On Range Query Usability Of Statistical DatabasesInternational Journal of Computer Mathematics, 79
(1995)
Value added networks ( VANs ) and their benefit to a health information system
R. Ahlswede, Harout Aydinian (2006)
On security of statistical databases2006 IEEE International Symposium on Information Theory
(2000)
Using graph labellings to store linkages in relational databases
Vivek Mishra, A. Stranieri, Mirka Miller, J. Ryan (2006)
Knowledge based regulation of statistical databases
(2006)
Managing privacy , trust , security , and context relationships using weighted graph representations
Mirka Miller, J. Seberry (1990)
Relative Compromise of Statistical DatabasesAust. Comput. J., 21
S. Morris, J. Cooper, D. Bomba, L. Brankovic, M. Miller, F. Pacheco (1995)
Australian healthcare: a smart card for a clever country.International journal of bio-medical computing, 40 2
F. Chin, G. Özsoyoglu (1982)
Auditing and Inference Control in Statistical DatabasesIEEE Transactions on Software Engineering, SE-8
(1991)
A model of statistical database compromise incorporating supplementary knowledge
L. Brankovic, P. Horák, Mirka Miller, G. Wrightson (1997)
Usability of compromise-free statistical databasesProceedings. Ninth International Conference on Scientific and Statistical Database Management (Cat. No.97TB100150)
Mirka Miller, J. Cooper (1996)
Security considerations for present and future medical databases.International journal of bio-medical computing, 41 1
L Brankovic, M Miller, J Širáň (1996)
Graphs, 0–1 matrices and usability of statistical databasesCongr. Numer., 120
R. Stanley (1980)
Weyl Groups, the Hard Lefschetz Theorem, and the Sperner PropertySIAM J. Algebraic Discret. Methods, 1
G. Skinner, Elizabeth Chang, M. McMahon, J. Aisbett, M. Miller (2004)
Shield privacy Hippocratic security method for virtual community30th Annual Conference of IEEE Industrial Electronics Society, 2004. IECON 2004, 1
J. Domingo-Ferrer, F. Sebé, Jordi Castellà-Roca (2004)
On the Security of Noise Addition for Privacy in Statistical Databases
M Miller, I Roberts, J Simpson (1994)
Prevention of relative compromise in statistical databases using audit expertBull. Inst. Combin. Appl., 10
P. Horák, L. Brankovic, Mirka Miller (1999)
A Combinatorial Problem in Database SecurityDiscret. Appl. Math., 91
M Miller, I Roberts, J Simpson (1991)
Application of symmetric chains to an optimization problem in the security of statistical databasesBull. Inst. Combin. Appl., 2
M Miller, J Cooper (1996)
Security considerations for present and future medical databasesInt. J. Med. Inform., 41
L. Brankovic, Mirka Miller, J. Širáň (1996)
Towards a Practical Auditing Method for the Prevention of Statistical Database Compromise
L. Brankovic, N. López, Mirka Miller, F. Sebé (2014)
Triangle randomization for social network data anonymizationArs Math. Contemp., 7
This survey directs its focus, not on the history of security in statistical databases, but on the contribution of Mirka Miller to this field. It begins with her early work in her PhD thesis in which she formalised the varieties of compromise, introduced a new compromise, the relative compromise, and classified supplementary knowledge. It follows on to include her innovative work in employing combinatorial concepts to formulate the bounds of usability of Audit Expert in both the absolute and relative compromise. It finishes in true Mirka style, leaving the reader with open problems and directions in which this area might progress.
Mathematics in Computer Science – Springer Journals
Published: Jun 19, 2018
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.