Abstract
This survey directs its focus, not on the history of security in statistical databases, but on the contribution of Mirka Miller to this field. It begins with her early work in her PhD thesis in which she formalised the varieties of compromise, introduced a new compromise, the relative compromise, and classified supplementary knowledge. It follows on to include her innovative work in employing combinatorial concepts to formulate the bounds of usability of Audit Expert in both the absolute and relative compromise. It finishes in true Mirka style, leaving the reader with open problems and directions in which this area might progress.
Similar content being viewed by others
References
Brankovic, L., López, N., Miller, M., Sebé, F.: Triangle randomization for social network data anonymization. Ars Math. Contempor. 7, 461–477 (2014)
Brankovic, L., Miller, M., Horak, P., Wrightson, G.: Usability of compromise free databases. In: Proceedings of the International Working Conference on Scientific and Statistical Database Management, pp. 144–154 (1997)
Brankovic, L., Miller, M., Širáň, J.: Graphs, 0–1 matrices and usability of statistical databases. Congr. Numer. 120, 169–182 (1996)
Brankovic, L., Miller, M., Širáň, J.: Towards a practical auditing method for the prevention of statistical database compromise. In: Proceedings of the Seventh Australasian Database Conference, pp 177–184 (1996)
Brankovic, L., Miller, M., Širáň, J.: On range query disability of statistical databases. Int. J. Comput. Math. 79(12), 1265–1271 (2002)
Chin, F.Y., Ozsoyoglu, G.: Auditing and inference control in statistical databases. IEEE Trans. Softw. Eng. SE–8(6), 574–582 (1982)
Domingo-Ferrer, J., Sebé, F., Castellá-Roca, J.: On the security of noise addition for privacy in statistical databases. In: Privacy in Statistical Databases, Lecture Notes in Computer Science, Vol. 3050, pp. 149–161 (2004)
Horak, P., Brankovic, L., Miller, M.: A combinatorial problem in database security. Discrete Appl. Math. 91(1–3), 119–126 (1999)
Miller, M.: Security of Statistical Databases, PhD Thesis, University of New South Wales (1990)
Miller, M.: A model of statistical database compromise incorporating supplementary knowledge. In: Proceedings DBIS’91, pp. 258–267 (1991)
Miller, M., Cooper, J.: Security considerations for present and future medical databases. Int. J. Med. Inform. 41, 39–46 (1996)
Miller, M., Roberts, I., Simpson, J.: Application of symmetric chains to an optimization problem in the security of statistical databases. Bull. Inst. Combin. Appl. 2, 47–58 (1991)
Miller, M., Roberts, I., Simpson, J.: Prevention of relative compromise in statistical databases using audit expert. Bull. Inst. Combin. Appl. 10, 51–62 (1994)
Miller, M., Seberry, J.: Relative compromise of statistical databases. Aust. Comput. Sci. Commun. 11(1), 23–31 (1989). Appendix
Miller, M., Seberry, J.: Audit expert and statistical database security. In: Australian Database Research Conference Proceedings, pp. 103–110 (1990)
Mishra, V., Stranieri, A., Miller, M., Ryan, J.: Knowledge based regulation of statistical databases. WSEAS Trans. Inf. Sci. Appl. 3(2), 239–244 (2006)
Pacheco, F., Cooper, J., Bomba, D., Morris, S., Miller, M., Brankovic, L.: Education issues in health informatics. Inform. Healthcare 4, 101–105 (1995)
Pacheco, F., Cooper, J., Bomba, D., Morris, S., Miller, M., Brankovic, L.: Value added networks (VANs) and their benefit to a health information system. Inform. Healthcare 4, 141–144 (1995)
Skinner, G., Chang, E., McMahon, M., Aisbett, J., Miller, M.: Shield privacy hippocratic security method for virtual community. In: IECON Proceedings (Industrial Electronics Conference), pp. 472–479 (2004)
Skinner, G., Miller, M.: Managing privacy, trust, security, and context relationships using weighted graph representations. WSEAS Trans. Inf. Sci. Appl. 3(2), 283–290 (2006)
Stanley, R.P.: Weyl groups, the hard Lefschetz theorem and the Sperner property. SIAM J. Alg. Disc. Meth. 1, 168–187 (1980)
Sutton, M., Miller, M.: Using graph labellings to store linkages in relational databases. In: Proceedings of Australasian Workshop on Combinatorial Algorithms, pp. 125–138 (2000)
Acknowledgements
In compiling this survey I have borrowed freely from the works of Professor Mirka Miller and her many co-authors, particularly Professors Jennifer Seberry and Ljiljana Brankovic, Mirka’s PhD supervisor and student respectively. Together these researchers form three academic generations of female professors in mathematics—a rare hat trick.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ryan, J. A Brief Survey on the Contribution of Mirka Miller to the Security of Statistical Databases. Math.Comput.Sci. 12, 255–262 (2018). https://doi.org/10.1007/s11786-018-0343-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11786-018-0343-7