-
2
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. R. Adam and J. C. Wortmann, Security-Control Methods for Statistical Databases: A Comparative Study, ACM Computing Surveys 21(4): 515-556 (1989).
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
3
-
-
33645583514
-
Learning mixtures of arbitrary Gaussians
-
S. Arora and R. Kannan. Learning mixtures of arbitrary Gaussians. ACM STOC, 2001.
-
(2001)
ACM STOC
-
-
Arora, S.1
Kannan, R.2
-
5
-
-
0019056889
-
A security machanism for statistical database
-
Beck, L., A security machanism for statistical database, ACM Transactions on Database Systems (TODS), 5(3), p.316-3338, 1980.
-
(1980)
ACM Transactions on Database Systems (TODS)
, vol.5
, Issue.3
, pp. 316-3338
-
-
Beck, L.1
-
6
-
-
84890184357
-
-
in preparation, November
-
Chawla S., Dwork, C., McSherry, F., Talwar, K., On the Utility of Privacy-Preserving Histograms, in preparation, November, 2004.
-
(2004)
On the Utility of Privacy-preserving Histograms
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Talwar, K.4
-
8
-
-
33645603860
-
Learning mixtures of Gaussians
-
S. Dasgupta, Learning mixtures of Gaussians, IEEE FOCS, 1999.
-
(1999)
IEEE FOCS
-
-
Dasgupta, S.1
-
9
-
-
0019054751
-
Secure statistical databases with random sample queries
-
Denning, D., Secure statistical databases with random sample queries, ACM Transactions on Database Systems (TODS), 5(3), p.291-315, 1980.
-
(1980)
ACM Transactions on Database Systems (TODS)
, vol.5
, Issue.3
, pp. 291-315
-
-
Denning, D.1
-
10
-
-
0032387555
-
Algebraic algorithms for sampling from conditional distributions
-
P. Diaconis and B. Sturmfels, Algebraic Algorithms for Sampling from Conditional Distributions, Annals of Statistics 26(1), pp. 363-397, 1998
-
(1998)
Annals of Statistics
, vol.26
, Issue.1
, pp. 363-397
-
-
Diaconis, P.1
Sturmfels, B.2
-
12
-
-
20444440962
-
Assessing the risk of disclosure of confidential categorical data
-
Oxford University Press
-
A. Dobra and S.E. Fienberg, and M. Trottini, Assessing the risk of disclosure of confidential categorical data, Bayesian Statistics 7, pp. 125-14, Oxford University Press, 2000.
-
(2000)
Bayesian Statistics
, vol.7
, pp. 125-214
-
-
Dobra, A.1
Fienberg, S.E.2
Trottini, M.3
-
13
-
-
84860984291
-
A cryptography-flavored approach to privacy in public databases
-
March
-
C. Dwork, A Cryptography-Flavored Approach to Privacy in Public Databases, lecture at Aladdin Workshop on Privacy in DATA, March, 2003; http://www.aladdin.cs.cmu.edu/workshops/privacy/slides/pdf/dwork.pdf)
-
(2003)
Lecture at Aladdin Workshop on Privacy in DATA
-
-
Dwork, C.1
-
15
-
-
33244461250
-
Privacy-preserving datamining on vertically partitioned databases
-
C. Dwork and K. Nissim, Privacy-Preserving Datamining on Vertically Partitioned Databases, Proc. CRYPTO 2004.
-
Proc. CRYPTO 2004
-
-
Dwork, C.1
Nissim, K.2
-
17
-
-
51249182622
-
The eigenvalues of random symmetric matrices
-
Füredi, Zoltán and Komlós, János, The eigenvalues of random symmetric matrices, Combinatorica, 1:3, 1981, pages 233-241.
-
(1981)
Combinatorica
, vol.1-3
, pp. 233-241
-
-
Füredi, Z.1
Komlós, J.2
-
18
-
-
21144442219
-
A survey on private information retrieval
-
Feb
-
W. Gasarch, A Survey on Private Information Retrieval. BEATCS Computational Complexity Column, 82, pp. 72-107, Feb 2004.
-
(2004)
BEATCS Computational Complexity Column
, vol.82
, pp. 72-107
-
-
Gasarch, W.1
-
19
-
-
0040863368
-
Privacy and the limits of the law
-
Deborah G. Johnson and Helen Nissenbaum, editors. Prentice Hall
-
R. Gavison, Privacy and the Limits of the Law, in Deborah G. Johnson and Helen Nissenbaum, editors, Computers, Ethics, and Social Values, pp. 332-351. Prentice Hall, 1995.
-
(1995)
Computers, Ethics, and Social Values
, pp. 332-351
-
-
Gavison, R.1
-
21
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali, Probabilistic Encryption, JCSS 28(2), pp. 270-299, 1984.
-
(1984)
JCSS
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
22
-
-
0024019017
-
A graph theoretic approach to statistical data security
-
D. Gusfield, A Graph Theoretic Approach to Statistical Data Security, SIAM Journal on Computing 17(3), pp. 552-571, 1988
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.3
, pp. 552-571
-
-
Gusfield, D.1
-
25
-
-
0037929598
-
Auditing boolean attributes
-
J. M. Kleinberg, C. H. Papadimitriou, and P. Raghavan, Auditing Boolean Attributes, J. Comput. Syst. Sci. 66(1), pp. 244-253, 2003
-
(2003)
J. Comput. Syst. Sci.
, vol.66
, Issue.1
, pp. 244-253
-
-
Kleinberg, J.M.1
Papadimitriou, C.H.2
Raghavan, P.3
-
26
-
-
0035186726
-
Spectral partitioning of random graphs
-
F. McSherry, Spectral Partitioning of Random Graphs, Proc. 42nd FOCS, pp. 529-537, 2001
-
(2001)
Proc. 42nd FOCS
, pp. 529-537
-
-
McSherry, F.1
-
27
-
-
0346202087
-
Multiple imputation for statistical disclosure limitation
-
T.E. Raghunathank, J.P. Reiter, and D.B. Rubin, Multiple Imputation for Statistical Disclosure Limitation, J. Official Statistics 19(1), 2003, pp. 1-16.
-
(2003)
J. Official Statistics
, vol.19
, Issue.1
, pp. 1-16
-
-
Raghunathank, T.E.1
Reiter, J.P.2
Rubin, D.B.3
-
29
-
-
0012776989
-
Discussion: Statistical disclosure limitation
-
D. B. Rubin, Discussion: Statistical Disclosure Limitation, Journal of Official Statistics 9(2), 1993, pp. 461-468.
-
(1993)
Journal of Official Statistics
, vol.9
, Issue.2
, pp. 461-468
-
-
Rubin, D.B.1
-
30
-
-
0002663098
-
SLINK: An optimally efficient algorithm for the single-link cluster method
-
Sibson, R, SLINK: an optimally efficient algorithm for the single-link cluster method, In the Computer Journal Vol. 16, No. 1, 1973, pages 30-34.
-
(1973)
The Computer Journal
, vol.16
, Issue.1
, pp. 30-34
-
-
Sibson, R.1
-
33
-
-
33645593043
-
A spectral algorithm for learning mixtures of distributions
-
S. Vempala and G. Wang, A spectral algorithm for learning mixtures of distributions, IEEE FOCS, 2002.
-
(2002)
IEEE FOCS
-
-
Vempala, S.1
Wang, G.2
-
34
-
-
31444450939
-
Masking and re-identification methods for public-use microdata: Overview and research problems
-
Springer LNCS 3050
-
W. E. Winkler. Masking and Re-identification Methods for Public-Use Microdata: Overview and Research Problems. In Proc. Privacy in Statistical Databases 2004, Springer LNCS 3050.
-
(2004)
Proc. Privacy in Statistical Databases
-
-
Winkler, W.E.1
-
35
-
-
31444450939
-
Re-identification methods for masked microdata
-
Springer LNCS 3050
-
W. E. Winkler. Re-identification Methods for Masked Microdata. In Proc. Privacy in Statistical Databases 2004, Springer LNCS 3050.
-
(2004)
Proc. Privacy in Statistical Databases
-
-
Winkler, W.E.1
|