-
2
-
-
0002227089
-
An interval classifier for database mining applications
-
Vancouver, British Columbia, Canada, August
-
Rakesh Agrawal, Sakti Ghosh, Tomasz Imielinski, Bala Iyer, and Arun Swami. An interval classifier for database mining applications. In Proc. of the VLDB Conference, pages 560-573, Vancouver, British Columbia, Canada, August 1992.
-
(1992)
Proc. of the VLDB Conference
, pp. 560-573
-
-
Agrawal, R.1
Ghosh, S.2
Imielinski, T.3
Iyer, B.4
Swami, A.5
-
4
-
-
0024914229
-
Security-control methods for statistical databases
-
Dec.
-
Nabil R. Adam and John C. Wortman. Security-control methods for statistical databases. ACM Computing Surveys, 21(4):515-556, Dec. 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortman, J.C.2
-
5
-
-
0002368671
-
The New Jersey data reduction report
-
Dec.
-
D. Barbara, W. DuMouchel, C. Faloutsos, P. J. Haas, J. M. Hellerstein, Y. Ioannidis, H. V. Jagadish, T. Johnson, R.Ng, V. Poosala, and K. Sevcik. The New Jersey Data Reduction Report. Data Engrg. Bull., 20:3-45, Dec. 1997.
-
(1997)
Data Engrg. Bull.
, vol.20
, pp. 3-45
-
-
Barbara, D.1
DuMouchel, W.2
Faloutsos, C.3
Haas, P.J.4
Hellerstein, J.M.5
Ioannidis, Y.6
Jagadish, H.V.7
Johnson, T.8
Ng, R.9
Poosala, V.10
Sevcik, K.11
-
6
-
-
0019056889
-
A security mechanism for statistical databases
-
September
-
Leland L. Beck. A security mechanism for statistical databases. ACM TODS, 5(3):316-338, September 1980.
-
(1980)
ACM TODS
, vol.5
, Issue.3
, pp. 316-338
-
-
Beck, L.L.1
-
7
-
-
0002587094
-
Truste: An online privacy seal program
-
Feb.
-
Paola Benassi. Truste: an online privacy seal program. Comm. ACM, 42(2):56-59, Feb. 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.2
, pp. 56-59
-
-
Benassi, P.1
-
8
-
-
0003802343
-
-
Wadsworth, Belmont
-
L. Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stone. Classification and Regression Trees. Wadsworth, Belmont, 1984.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
9
-
-
0001853449
-
Quasi cubes: Exploiting approximations in multidimensional databases
-
D. Barbara and M. Sullivan. Quasi cubes: Exploiting approximations in multidimensional databases. SIGMOD Record, 26(3):12-17, 1997.
-
(1997)
SIGMOD Record
, vol.26
, Issue.3
, pp. 12-17
-
-
Barbara, D.1
Sullivan, M.2
-
11
-
-
0020205885
-
Auditing and infrence control in statistical databases
-
April
-
F.Y. Chin and G. Ozsoyoglu. Auditing and infrence control in statistical databases. IEEE Trans. Softw. Eng., SE-8(6):113-139, April 1982.
-
(1982)
IEEE Trans. Softw. Eng.
, vol.SE-8
, Issue.6
, pp. 113-139
-
-
Chin, F.Y.1
Ozsoyoglu, G.2
-
12
-
-
0000082189
-
Suppression methodology and statistical disclosure control
-
April
-
L.H. Cox. Suppression methodology and statistical disclosure control. J. Am. Stat. Assoc., 75(370):377-395, April 1980.
-
(1980)
J. Am. Stat. Assoc.
, vol.75
, Issue.370
, pp. 377-395
-
-
Cox, L.H.1
-
14
-
-
0003582713
-
Beyond concern: Understanding net users' attitudes about online privacy
-
April
-
L.F. Cranor, J. Reagle, and M.S. Ackerman. Beyond concern: Understanding net users' attitudes about online privacy. Technical Report TR 99.4.3, AT&T Labs-Research, April 1999. Available from http://wnn.research.att.com/library/trs/TRs/99/99.4/99.4.3/report.htm.
-
(1999)
Technical Report TR 99.4.3, AT&T Labs-research
-
-
Cranor, L.F.1
Reagle, J.2
Ackerman, M.S.3
-
15
-
-
0002976555
-
Special issue on internet privacy
-
Feb.
-
Lorrie Faith Cranor, editor. Special Issue on Internet Privacy. Comm. ACM, 42(2), Feb. 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.2
-
-
Cranor, L.F.1
-
16
-
-
0017242759
-
Selective partial access to a database
-
R. Conway and D. Strip. Selective partial access to a database. In Proc. ACM Annual Conf., pages 85-89, 1976.
-
(1976)
Proc. ACM Annual Conf.
, pp. 85-89
-
-
Conway, R.1
Strip, D.2
-
17
-
-
0018442066
-
The tracker: A threat to statistical database security
-
March
-
D.E. Denning, P.J. Denning, and M.D. Schwartz. The tracker: A threat to statistical database security. ACM TODS, 4(1):76-96, March 1979.
-
(1979)
ACM TODS
, vol.4
, Issue.1
, pp. 76-96
-
-
Denning, D.E.1
Denning, P.J.2
Schwartz, M.D.3
-
18
-
-
0019054751
-
Secure statistical databases with random sample queries
-
Sept.
-
D.E. Denning. Secure statistical databases with random sample queries. ACM TODS, 5(3):291-315, Sept. 1980.
-
(1980)
ACM TODS
, vol.5
, Issue.3
, pp. 291-315
-
-
Denning, D.E.1
-
21
-
-
0018444418
-
Secure databases: Protection against user influence
-
March
-
D. Dobkin, A.K. Jones, and R.J. Lipton. Secure databases: Protection against user influence. ACM TODS, 4(1):97-106, March 1979.
-
(1979)
ACM TODS
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.K.2
Lipton, R.J.3
-
22
-
-
84958048324
-
Data swapping: Balancing privacy against precision in mining for logic rules
-
M. Mohania and A.M. Tjoa, editors, Springer-Verlag Lecture Notes in Computer Science 1676
-
V. Estivill-Castro and L. Brankovic. Data swapping: Balancing privacy against precision in mining for logic rules. In M. Mohania and A.M. Tjoa, editors, Data Warehousing and Knowledge Discovery DaWaK-99, pages 389-398. Springer-Verlag Lecture Notes in Computer Science 1676, 1999.
-
(1999)
Data Warehousing and Knowledge Discovery DaWaK-99
, pp. 389-398
-
-
Estivill-Castro, V.1
Brankovic, L.2
-
23
-
-
12244253213
-
The economist
-
May
-
The Economist. The End of Privacy, May 1999.
-
(1999)
The End of Privacy
-
-
-
26
-
-
0002646970
-
On the question of statistical confidentiality
-
March
-
I.P. Fellegi. On the question of statistical confidentiality. J. Am. Stat. Assoc., 67(337):7-18, March 1972.
-
(1972)
J. Am. Stat. Assoc.
, vol.67
, Issue.337
, pp. 7-18
-
-
Fellegi, I.P.1
-
28
-
-
84994073311
-
Recovering information from summary data
-
Athens, Greece
-
C. Faloutsos, H.V. Jagadish, and N.D. Sidiropoulos. Recovering information from summary data. In Proc. of the 23rd Int'l Conference on Very Large Databases, pages 36-45, Athens, Greece, 1997.
-
(1997)
Proc. of the 23rd Int'l Conference on Very Large Databases
, pp. 36-45
-
-
Faloutsos, C.1
Jagadish, H.V.2
Sidiropoulos, N.D.3
-
29
-
-
0030644696
-
Privacy-enhancing technologies for the internet
-
February
-
Ian Goldberg, David Wagner, and Eric Brewer. Privacy-enhancing technologies for the internet. In IEEE COMPCON, February 97.
-
(1997)
IEEE COMPCON
-
-
Goldberg, I.1
Wagner, D.2
Brewer, E.3
-
30
-
-
0041647025
-
Privacy in the marketplace
-
C. Hine and J. Eve. Privacy in the marketplace. The Information Society, 42(2):56-59, 1998.
-
(1998)
The Information Society
, vol.42
, Issue.2
, pp. 56-59
-
-
Hine, C.1
Eve, J.2
-
31
-
-
0004203565
-
-
Harvard Business School Press
-
John Hagel and Marc Singer. Net Worth. Harvard Business School Press, 1999.
-
(1999)
Net Worth
-
-
Hagel, J.1
Singer, M.2
-
32
-
-
0022130080
-
A data distortion by probability distribution
-
Chong K. Liew, Uinam J. Choi, and Chung J. Liew. A data distortion by probability distribution. ACM TODS, 10(3):395-411, 1985.
-
(1985)
ACM TODS
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.K.1
Choi, U.J.2
Liew, C.J.3
-
33
-
-
0002654263
-
Privacy interfaces for information management
-
October
-
Tessa Lau, Oren Etzioni, and Daniel S. Weld. Privacy interfaces for information management. Comm. ACM, 42(10):89-94, October 1999.
-
(1999)
Comm. ACM
, vol.42
, Issue.10
, pp. 89-94
-
-
Lau, T.1
Etzioni, O.2
Weld, D.S.3
-
36
-
-
0002356150
-
SLIQ: A fast scalable classifier for data mining
-
Avignon, France, March
-
Manish Mehta, Rakesh Agrawal, and Jorma Rissanen. SLIQ: A fast scalable classifier for data mining. In Proc. of the Fifth Int'l Conference on Extending Database Technology (EDBT), Avignon, France, March 1996.
-
(1996)
Proc. of the Fifth Int'l Conference on Extending Database Technology (EDBT)
-
-
Mehta, M.1
Agrawal, R.2
Rissanen, J.3
-
38
-
-
0041647017
-
-
January
-
Office of the Information and Privacy Commissioner, Ontario. Data Mining: Staking a Claim on Your Privacy, January 1998. Available from http://www.ipc.on.ca/web_site. eng/matters/sum_pap/papers/datamine.htm.
-
(1998)
Data Mining: Staking a Claim on Your Privacy
-
-
-
39
-
-
0031140709
-
Internet security: Firewalls and beyond
-
May
-
R. Oppliger. Internet security: Firewalls and beyond. Comm. ACM, 40(5):92-102, May 1997.
-
(1997)
Comm. ACM
, vol.40
, Issue.5
, pp. 92-102
-
-
Oppliger, R.1
-
41
-
-
0021389555
-
Practical data-swapping: The first steps
-
Steven P. Reiss. Practical data-swapping: The first steps. ACM TODS, 9(1):20-37, 1984.
-
(1984)
ACM TODS
, vol.9
, Issue.1
, pp. 20-37
-
-
Reiss, S.P.1
-
42
-
-
0032164210
-
A survey of the world wide web security
-
Sept.
-
A. Rubin and D. Greer. A survey of the world wide web security. IEEE Computer, 31(9):34-41, Sept. 1998.
-
(1998)
IEEE Computer
, vol.31
, Issue.9
, pp. 34-41
-
-
Rubin, A.1
Greer, D.2
-
43
-
-
0002139432
-
SPRINT: A scalable parallel classifier for data mining
-
Bombay, India, September
-
John Shafer, Rakesh Agrawal, and Manish Mehta. SPRINT: A scalable parallel classifier for data mining. In Proc. of the 22nd Int'l Conference on Very Large Databases, Bombay, India, September 1996.
-
(1996)
Proc. of the 22nd Int'l Conference on Very Large Databases
-
-
Shafer, J.1
Agrawal, R.2
Mehta, M.3
-
44
-
-
0020313372
-
Statistical databases: Characteristics, problems and some solutions
-
Mexico City, Mexico, September
-
A. Shoshani. Statistical databases: Characteristics, problems and some solutions. In Proceedings of the Eighth International Conference on Very Large Databases (VLDB), pages 208-213, Mexico City, Mexico, September 1982.
-
(1982)
Proceedings of the Eighth International Conference on Very Large Databases (VLDB)
, pp. 208-213
-
-
Shoshani, A.1
-
45
-
-
0025447566
-
Design of LDV: A multilevel secure relational database management system
-
P.D. Stachour and B.M. Thuraisingham. Design of LDV: A multilevel secure relational database management system. IEEE Trans. Knowledge and Data Eng., 2(2):190-209, 1990.
-
(1990)
IEEE Trans. Knowledge and Data Eng.
, vol.2
, Issue.2
, pp. 190-209
-
-
Stachour, P.D.1
Thuraisingham, B.M.2
-
46
-
-
0003585005
-
Data mining and privacy: A conflict in making
-
March
-
Kurt Thearling. Data mining and privacy: A conflict in making. DS*, March 1998.
-
(1998)
DS*
-
-
Thearling, K.1
-
48
-
-
0021622802
-
The statistical security of a statistical database
-
Dec.
-
J.F. Traub, Y. Yemini, and H. Woznaikowski. The statistical security of a statistical database. ACM TODS, 9(4):672-679, Dec. 1984.
-
(1984)
ACM TODS
, vol.9
, Issue.4
, pp. 672-679
-
-
Traub, J.F.1
Yemini, Y.2
Woznaikowski, H.3
-
49
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
March
-
S.L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc., 60(309):63-69, March 1965.
-
(1965)
J. Am. Stat. Assoc.
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
50
-
-
0042648867
-
-
Technical report, Louis Harris & Associates, June
-
A.F. Westin. E-commerce and privacy: What net users want. Technical report, Louis Harris & Associates, June 1998. Available from http://www.privacyexchange.org/iss/surveys/ecommsum.html.
-
(1998)
E-commerce and Privacy: What Net Users Want
-
-
Westin, A.F.1
-
51
-
-
0041647015
-
-
Technical report, Louis Harris & Associates, Dec.
-
A.F. Westin. Privacy concerns & consumer choice. Technical report, Louis Harris & Associates, Dec. 1998. Available from http://www.privacyexchange.org/iss/surveys/1298toc.html.
-
(1998)
Privacy Concerns & Consumer Choice
-
-
Westin, A.F.1
-
52
-
-
0008715899
-
-
Technical report, Opinion Research Corporation, July
-
A.F. Westin. Freebies and privacy: What net users think. Technical report, Opinion Research Corporation, July 1999. Available from http://www.privacyexchange.org/iss/surveys/sr990714.html.
-
(1999)
Freebies and Privacy: What Net Users Think
-
-
Westin, A.F.1
-
53
-
-
85037512350
-
The world wide web consortium
-
The World Wide Web Consortium. The Platform for Privacy Preference (P3P). Available from http://www.w3.org/P3P/P3FAQ.html.
-
The Platform for Privacy Preference (P3P)
-
-
|