### Lessons
1. [[Secure Computer Systems/Database Security|Accessing structured data in database systems (DB)]]
2. [[Database Security#Access Control|An example DB and Access control in DB]]
3. [[Database Security#Stored procedures|Stored procedures]] and [[Database Security#Views|views]]
4. [[Database Security#Inference attacks|Inference attacks]]
5. Statistical Query Inference attack examples
6. Can we defend against inference attacks?
7. Another Approach: Making Information in the Database Public
8. De-identification
9. Anonymization
10. [[Differential privacy|Differential Privacy]]
11. [[Differential privacy#Implementation|Implementing Differential Privacy]]
12. [[Differential privacy#Implementation|DP Implementation and Usage]]
13. Summary
### Readings
- [An authorization mechanism for relational databases](https://dl.acm.org/citation.cfm?id=320482)
- [Security-control methods for statistical databases](https://dl.acm.org/citation.cfm?id=76895)
- [Data privacy and k-anonymity](http://dataprivacylab.org/dataprivacy/projects/kanonymity/kanonymity.pdf)
- [Differential Privacy; A Survey of Results](https://www.microsoft.com/en-us/research/publication/differential-privacy-a-survey-of-results/)