-
1
-
-
1142303699
-
Information sharing across private databases
-
R. Agrawal, A. Evfimievski, R. Srikant, Information Sharing Across Private Databases, Proc. SIGMOD, pp. 86-97, 2003.
-
(2003)
Proc. SIGMOD
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
2
-
-
18844365338
-
Watermarking relational databases
-
VLDB
-
R. Agrawal, J. Kiernan, Watermarking Relational Databases, Proc. VLDB, VLDB, pp.155-166, 2002.
-
(2002)
Proc. VLDB
, pp. 155-166
-
-
Agrawal, R.1
Kiernan, J.2
-
3
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal, R. Srikant, Privacy-preserving data mining, Proc. SIGMOD, pp. 439-450, 2000.
-
(2000)
Proc. SIGMOD
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
85012127915
-
Privacy-preserving indexing of documents on the network
-
M. Bawa, R. J. Bayardo Jr., R. Agrawal, Privacy-Preserving Indexing of Documents on the Network, Proc. VLDB, pp.922-933, 2003.
-
(2003)
Proc. VLDB
, pp. 922-933
-
-
Bawa, M.1
Bayardo Jr., R.J.2
Agrawal, R.3
-
5
-
-
16644396185
-
Chip-secured data access: Confidential data on untrusted servers
-
L. Bouganim, P. Pucheral, Chip-Secured Data Access: Confidential Data on Untrusted Servers, Proc. VLDB, pp. 131-142, 2002.
-
(2002)
Proc. VLDB
, pp. 131-142
-
-
Bouganim, L.1
Pucheral, P.2
-
7
-
-
6444233602
-
Query-preserving watermarking of relational databases and XML documents
-
D. G. Amblard, Query-preserving Watermarking of Relational Databases and XML documents. Proc. PODS, pp. 191-201, 2003.
-
(2003)
Proc. PODS
, pp. 191-201
-
-
Amblard, D.G.1
-
8
-
-
28444462239
-
Comparing SDC methods for microdata on the basis of information loss and disclosure risk
-
J. D. Ferrer, J. M. Sanz, and V. Torra, Comparing SDC Methods for Microdata on the Basis of Information Loss and Disclosure Risk, Proc. of NTTS and ETK, 2001.
-
(2001)
Proc. of NTTS and ETK
-
-
Ferrer, J.D.1
Sanz, J.M.2
Torra, V.3
-
10
-
-
0036356364
-
A proposed key escrow system for secure patient information disclosure in biomedical research databases
-
T. A. Ferris, G. M Garrison, H. J. Lowe, A Proposed Key Escrow System for Secure Patient Information Disclosure in Biomedical Research Databases, Proc. AMIA Annual Symposium, pp. 245-249, 2002.
-
(2002)
Proc. AMIA Annual Symposium
, pp. 245-249
-
-
Ferris, T.A.1
Garrison, G.M.2
Lowe, H.J.3
-
11
-
-
0035873984
-
Statistical perspectives on confidentiality and data access in public health
-
S. E. Fienberg, Statistical Perspectives on Confidentiality and Data Access in Public Health, Stat Med, 20(9-10), pp. 1347-1356, 2001.
-
(2001)
Stat Med
, vol.20
, Issue.9-10
, pp. 1347-1356
-
-
Fienberg, S.E.1
-
12
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
H. Hacigms, B. R. Iyer, C. Li, S. Mehrotra, Executing SQL Over Encrypted Data in the Database-service-provider Model. Proc. SIGMOD, pp. 216-227, 2002.
-
(2002)
Proc. SIGMOD
, pp. 216-227
-
-
Hacigms, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
14
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. S. Iyengar, Transforming Data to Satisfy Privacy Constraints, Proc. SIGKDD, pp.279-288, 2002.
-
(2002)
Proc. SIGKDD
, pp. 279-288
-
-
Iyengar, V.S.1
-
16
-
-
28444475268
-
Security and confidentiality approach for the clinical E-science framework (CLEF)
-
nd UK E-Science "All Hands Meetings", pp825-832, 2003
-
(2003)
nd UK E-Science "All Hands Meetings"
, pp. 825-832
-
-
Kalra, D.1
Singleton, P.2
Ingram, D.3
Milan, J.4
MacKay, J.5
Detmer, D.6
Rector, A.L.7
-
17
-
-
0002640563
-
Masking microdata files
-
ASA (American Statistical Association)
-
J. Kim and W. Winkler, Masking Microdata Files, ASA (American Statistical Association) Proc. on Survey Research Methods, pp. 114-119, 1995.
-
(1995)
Proc. on Survey Research Methods
, pp. 114-119
-
-
Kim, J.1
Winkler, W.2
-
18
-
-
0000964471
-
Measures of disclosure risk and harm
-
D. Lambert, Measures of Disclosure Risk and Harm, Journal of Official Statistics, 9(2), pp. 313-331, 1993.
-
(1993)
Journal of Official Statistics
, vol.9
, Issue.2
, pp. 313-331
-
-
Lambert, D.1
-
19
-
-
0036357125
-
Using binning to maintain confidentiality of medical data
-
Z. Lin, M. Hewett, and R. B. Altman, Using Binning to Maintain Confidentiality of Medical Data, American Medical Informatics Association Annual Symposium, pp. 454-459, 2002.
-
(2002)
American Medical Informatics Association Annual Symposium
, pp. 454-459
-
-
Lin, Z.1
Hewett, M.2
Altman, R.B.3
-
20
-
-
18844407290
-
Constructing a virtual primary key for fingerprinting relational data
-
Y. J. Li, V. Swarup, and S. Jajodia, Constructing a Virtual Primary Key for Fingerprinting Relational Data, Proc. ACM Workshop on Digital Rights Management, pp. 133-141, 2003.
-
(2003)
Proc. ACM Workshop on Digital Rights Management
, pp. 133-141
-
-
Li, Y.J.1
Swarup, V.2
Jajodia, S.3
-
21
-
-
85009120801
-
Controlling access to published data using cryptography
-
G. Miklau, D. Suciu, Controlling Access to Published Data Using Cryptography, Proc. VLDB, pp. 898-909, 2003.
-
(2003)
Proc. VLDB
, pp. 898-909
-
-
Miklau, G.1
Suciu, D.2
-
23
-
-
2442531718
-
Proving ownership over categorical data
-
R. Sion, Proving Ownership over Categorical Data, Proc. ICDE, 2004.
-
(2004)
Proc. ICDE
-
-
Sion, R.1
-
24
-
-
35248858328
-
On watermarking numeric sets
-
Proc. IWDW
-
R. Sion, M. Atallab, and S. Prabhakar, On Watermarking Numeric Sets. Proc. IWDW, LNCS 2613, pp. 130-146, 2002.
-
(2002)
LNCS
, vol.2613
, pp. 130-146
-
-
Sion, R.1
Atallab, M.2
Prabhakar, S.3
-
26
-
-
0242698173
-
Datafly: A system for providing anonymity in medical data
-
L. Sweeney, Datafly: A System for Providing Anonymity in Medical Data, Proc. Database Security, pp. 356-381, 1998.
-
(1998)
Proc. Database Security
, pp. 356-381
-
-
Sweeney, L.1
-
27
-
-
0004166728
-
Can invisible watermarks resolve rightful ownerships?
-
IBM Research Division
-
S. Craver, N. Memon, B. Yeo, and M. Yeung, Can Invisible Watermarks Resolve Rightful Ownerships? Technique Report RC 20509, IBM Research Division, 1996.
-
(1996)
Technique Report
, vol.RC 20509
-
-
Craver, S.1
Memon, N.2
Yeo, B.3
Yeung, M.4
-
28
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati, Protecting Respondents' Identities in Microdata Release, IEEE Trans. Knowledge Engineering, 13(6), pp. 1010-1027, 2001.
-
(2001)
IEEE Trans. Knowledge Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
29
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
SRI International
-
P. Samarati, L. Sweeney, Protecting Privacy when Disclosing Information: K-Anonymity and Its Enforcement Through Generalization and Suppression, Technical Report, SRI International, 1998.
-
(1998)
Technical Report
-
-
Samarati, P.1
Sweeney, L.2
-
30
-
-
1142267351
-
Winnowing: Local algorithms for document fingerprinting
-
S. Schleimer, D. S. Wilkerson, A. Aiken, Winnowing: Local Algorithms for Document Fingerprinting, Proc. SIGMOD, pp. 76-85, 2003.
-
(2003)
Proc. SIGMOD
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.S.2
Aiken, A.3
-
31
-
-
0003229411
-
Statistical disclosure control in practice
-
Springer-Verlag
-
L. Willenborg and T. D. Waal, Statistical Disclosure Control in Practice, Lecture Notes in Statistics, Vol. 111, Springer-Verlag, 1996.
-
(1996)
Lecture Notes in Statistics
, vol.111
-
-
Willenborg, L.1
Waal, T.D.2
-
32
-
-
28444466660
-
Disclore risk assessment in perturbative microdata protection
-
Statistical Research Division, Bureau of the Census
-
W. Yancey, W. Winkler, R. Creecy, Disclore Risk Assessment in Perturbative Microdata Protection, Technical Report 2002-01, Statistical Research Division, Bureau of the Census.
-
Technical Report 2002-01
-
-
Yancey, W.1
Winkler, W.2
Creecy, R.3
|