{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:33Z","timestamp":1773615633638,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080265","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"984-990","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparative Analysis of Methods for Protection against Logical Inference"],"prefix":"10.3103","volume":"55","author":[{"given":"A. A.","family":"Poltavtsev","sequence":"first","affiliation":[]},{"given":"A. R.","family":"Khabarov","sequence":"additional","affiliation":[]},{"given":"A. O.","family":"Selyankin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7426_CR1","doi-asserted-by":"publisher","first-page":"829","DOI":"10.3103\/S0146411620080271","volume":"54","author":"A.A. Poltavtsev","year":"2020","unstructured":"Poltavtsev, A.A., Khabarov, A.R., and Selyankin, A.O., Inference attacks and information security in databases, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 829\u2013833. \u00a0https:\/\/doi.org\/10.3103\/S0146411620080271","journal-title":"Autom. Control Comput. Sci."},{"key":"7426_CR2","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M.A., Evolution of data management systems and their security, Int. Conf. on Engineering Technologies and Computer Science (EnT), Moscow, 2019, IEEE, 2019, pp. 25\u201329. \u00a0https:\/\/doi.org\/10.1109\/EnT.2019.00010","DOI":"10.1109\/EnT.2019.00010"},{"key":"7426_CR3","doi-asserted-by":"publisher","first-page":"903","DOI":"10.3103\/S0146411619080261","volume":"53","author":"M.A. Poltavtseva","year":"2019","unstructured":"Poltavtseva, M.A., Zegzhda, D.P., and Kalinin, M.O., Big data management system security threat model, Autom.\u00a0Control Comput. Sci., 2019, vol. 53, no. 8, pp. 903\u2013913. \u00a0https:\/\/doi.org\/10.3103\/S0146411619080261","journal-title":"Autom.\u00a0Control Comput. Sci."},{"key":"7426_CR4","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3103\/S014641161908025X","volume":"53","author":"M.A. Poltavtseva","year":"2019","unstructured":"Poltavtseva, M.A. and Kalinin, M.O., Modeling big data management systems in information security, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 895\u2013902. \u00a0https:\/\/doi.org\/10.3103\/S014641161908025X","journal-title":"Autom. Control Comput. Sci."},{"key":"7426_CR5","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M.A. and Kalinin, M.O., Conceptual data modeling using aggregates to ensure large-scale distributed data management systems, Intelligent Distributed Computing XIII. IDC 2019, Kotenko, I., Badica, C., Desnitsky, V., El Baz, D., and Ivanovic, M., Eds., Studies in Computational Intelligence, vol. 868, Cham: Springer, 2020, pp. 41\u201347. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-32258-8_5","DOI":"10.1007\/978-3-030-32258-8_5"},{"key":"7426_CR6","doi-asserted-by":"publisher","first-page":"914","DOI":"10.3103\/S0146411619080273","volume":"53","author":"M.A. Poltavtseva","year":"2019","unstructured":"Poltavtseva, M.A., A consistent approach to building secure big data processing and storage systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 914\u2013921. \u00a0https:\/\/doi.org\/10.3103\/S0146411619080273","journal-title":"Autom. Control Comput. Sci."},{"key":"7426_CR7","unstructured":"Chauhan, S.K., A study of inference control techniques, Bachelor\u2019s (Comput. Sci. Eng.) Thesis, Rourkela, India: National Inst. of Technology Rourkela, 2010."},{"key":"7426_CR8","doi-asserted-by":"crossref","unstructured":"Su, T. and Ozsoyoglu, G., Inference in MLS database systems, IEEE Trans. Knowl. Data Eng., 1991, pp. 474\u2013485.","DOI":"10.1109\/69.109108"},{"key":"7426_CR9","first-page":"505","volume":"18","author":"M.M. Govorova","year":"2015","unstructured":"Govorova, M.M., Govorov, A.I., and Maslennikov, R.I., Program of standardization of relational databases as a basis for subject-oriented intellectual teaching system, Obraz. Tekhnol. Obshch., 2015, vol. 18, pp. 505\u2013518.","journal-title":"Obraz. Tekhnol. Obshch."},{"key":"7426_CR10","doi-asserted-by":"publisher","unstructured":"Yip, R.W. and Levitt, K.N., Data level inference detection in database systems, 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), Rockport, Mass., 1998, IEEE, 1998, pp. 179\u2013189. \u00a0https:\/\/doi.org\/10.1109\/CSFW.1998.683168","DOI":"10.1109\/CSFW.1998.683168"},{"key":"7426_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MC.1983.1654444","volume":"16","author":"D.E. Denning","year":"1983","unstructured":"Denning, D.E. and Schlorer, J., Inference controls for statistical databases, Computer, 1983, vol. 16, no. 7, pp.\u00a069\u201382. \u00a0https:\/\/doi.org\/10.1109\/MC.1983.1654444","journal-title":"Computer"},{"key":"7426_CR12","doi-asserted-by":"publisher","unstructured":"Truta, T.M., Fotouhi, F., and Barth-Jones, D., Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures, Proc. 2003 ACM Workshop on Privacy in the Electronic Society, Washington, D.C., 2003, New York: Association for Computing Machinery, 2003, pp. 21\u201330. \u00a0https:\/\/doi.org\/10.1145\/1005140.1005144","DOI":"10.1145\/1005140.1005144"},{"key":"7426_CR13","first-page":"635","volume":"21","author":"S. Gomatam","year":"2005","unstructured":"Gomatam, S., Karr, A.F., and Sanil, A.P., Data swapping as a decision problem, J. Off. Stat., 2005, vol. 21, no.\u00a04, pp. 635\u2013655.","journal-title":"J. Off. Stat."},{"key":"7426_CR14","unstructured":"Oparina, T.M., DBMS security policy protecting against obtaining information using logical inferences, Mat. Strukt. Mod., 2004, no. 13, pp. 140\u2013143."},{"key":"7426_CR15","volume-title":"Data swapping as a more efficient tool to create anonymized census microdata in Japan","author":"S. Ito","year":"2014","unstructured":"Ito, S. and Hoshino, N., Data swapping as a more efficient tool to create anonymized census microdata in Japan, Berlin: Springer, 2014."},{"key":"7426_CR16","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R. and Worthmann, J.C., Security-control methods for statistical databases: a\u00a0comparative study, ACM Comput. Surv., 1989, vol. 21, no. 4, pp. 515\u2013556. \u00a0https:\/\/doi.org\/10.1145\/76894.76895","journal-title":"ACM Comput. Surv."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080265.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080265","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080265.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:34Z","timestamp":1773612154000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080265"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7426"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080265","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"19 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}