### Lessons 1. [[Secure Computer Systems/Database Security|Accessing structured data in database systems (DB)]] 2. [[Database Security#Access Control|An example DB and Access control in DB]] 3. [[Database Security#Stored procedures|Stored procedures]] and [[Database Security#Views|views]] 4. [[Database Security#Inference attacks|Inference attacks]] 5. Statistical Query Inference attack examples  6. Can we defend against inference attacks?  7. Another Approach: Making Information in the Database Public  8. De-identification  9. Anonymization  10. [[Differential privacy|Differential Privacy]] 11. [[Differential privacy#Implementation|Implementing Differential Privacy]] 12. [[Differential privacy#Implementation|DP Implementation and Usage]]  13. Summary ### Readings - [An authorization mechanism for relational databases](https://dl.acm.org/citation.cfm?id=320482)  - [Security-control methods for statistical databases](https://dl.acm.org/citation.cfm?id=76895)  - [Data privacy and k-anonymity](http://dataprivacylab.org/dataprivacy/projects/kanonymity/kanonymity.pdf)  - [Differential Privacy; A Survey of Results](https://www.microsoft.com/en-us/research/publication/differential-privacy-a-survey-of-results/)