-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam, N. R., J. C. Wortmann. 1989. Security-control methods for statistical databases: A comparative study. ACM Comput. Surveys 21(4) 515-556.
-
(1989)
ACM Comput. Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
3
-
-
85032400475
-
Disclosure limitation of sensitive rules
-
IEEE Computer Science Society, Washington, D.C.
-
Atallah, M., E. Bertino, A. Elmagarmid, M. Ibrahim, V. Verykios. 1999. Disclosure limitation of sensitive rules. Proc. IEEE Knowledge and Data Engineering Exchange Workshop (KEDX'99). IEEE Computer Science Society, Washington, D.C., 45-52.
-
(1999)
Proc. IEEE Knowledge and Data Engineering Exchange Workshop (KEDX'99)
, pp. 45-52
-
-
Atallah, M.1
Bertino, E.2
Elmagarmid, A.3
Ibrahim, M.4
Verykios, V.5
-
4
-
-
0003408496
-
-
Department of Information and Computer Science, University of California, Irvine, CA
-
Blake, C., E. Keogh, C. J. Merz. 1998. UCI repository of machine learning databases. Department of Information and Computer Science, University of California, Irvine, CA. http://www.ics.uci.edu/~mlearn/MLRepository.html.
-
(1998)
UCI Repository of Machine Learning Databases
-
-
Blake, C.1
Keogh, E.2
Merz, C.J.3
-
6
-
-
0033349024
-
Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators
-
Chowdhury, D. S., G. T. Duncan, R. Krishnan, S. F. Roehrig, S. Mukherjee. 1999. Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators. Management Sci. 45(12) 1710-1723.
-
(1999)
Management Sci.
, vol.45
, Issue.12
, pp. 1710-1723
-
-
Chowdhury, D.S.1
Duncan, G.T.2
Krishnan, R.3
Roehrig, S.F.4
Mukherjee, S.5
-
7
-
-
84924515134
-
Network models for complementary cell suppression
-
Cox, L. H. 1995. Network models for complementary cell suppression. J. Amer. Statist. Assoc. 90(432) 1453-1462.
-
(1995)
J. Amer. Statist. Assoc.
, vol.90
, Issue.432
, pp. 1453-1462
-
-
Cox, L.H.1
-
8
-
-
0001501223
-
"How did they get my name?": An exploratory investigation of consumer attitudes toward secondary information use
-
Culnan, M. 1993. "How did they get my name?": An exploratory investigation of consumer attitudes toward secondary information use. MIS Quart. 17(3) 341-363.
-
(1993)
MIS Quart.
, vol.17
, Issue.3
, pp. 341-363
-
-
Culnan, M.1
-
9
-
-
0011702229
-
Data swapping: A technique for disclosure control
-
Dalenius, T., S. P. Reiss. 1982. Data swapping: A technique for disclosure control. J. Statist. Planning Inference 6(1) 73-85.
-
(1982)
J. Statist. Planning Inference
, vol.6
, Issue.1
, pp. 73-85
-
-
Dalenius, T.1
Reiss, S.P.2
-
10
-
-
0020779363
-
Inference control for statistical databases
-
Denning, D. E., J. Schlörer. 1983. Inference control for statistical databases. Computer 16(7) 69-82.
-
(1983)
Computer
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.E.1
Schlörer, J.2
-
13
-
-
84952535404
-
The risk of disclosure for microdata
-
Duncan, G. T., D. Lambert. 1989. The risk of disclosure for microdata. J. Bus. Econom. Statist. 7(2) 201-217.
-
(1989)
J. Bus. Econom. Statist.
, vol.7
, Issue.2
, pp. 201-217
-
-
Duncan, G.T.1
Lambert, D.2
-
14
-
-
2242464139
-
Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise
-
Duncan, G. T., S. Mukherjee. 2000. Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise. J. Amer. Statist. Assoc. 95(451) 720-729.
-
(2000)
J. Amer. Statist. Assoc.
, vol.95
, Issue.451
, pp. 720-729
-
-
Duncan, G.T.1
Mukherjee, S.2
-
15
-
-
84958048324
-
Data swapping: Balancing privacy against precision in mining for logic rules
-
M. Mukesh, A. M. Tjoa, eds. Springer-Verlag, Berlin, Germany
-
Estivill-Castro, V., L. Brankovic. 1999. Data swapping: Balancing privacy against precision in mining for logic rules. M. Mukesh, A. M. Tjoa, eds. Data Warehousing and Knowledge Discovery (DaWak'99). Springer-Verlag, Berlin, Germany, 389-398.
-
(1999)
Data Warehousing and Knowledge Discovery (DaWak'99)
, pp. 389-398
-
-
Estivill-Castro, V.1
Brankovic, L.2
-
16
-
-
0242625281
-
Privacy preserving mining of association rules
-
ACM Press, New York
-
Evfimievski, A., R. Srikant, R. Agrawal, J. Gehrke. 2002. Privacy preserving mining of association rules. Proc. 8th ACM SIGKDD Internat. Conf. Knowledge Discovery Data Mining. ACM Press, New York, 217-228.
-
(2002)
Proc. 8th ACM SIGKDD Internat. Conf. Knowledge Discovery Data Mining
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
17
-
-
35048813475
-
Data swapping: Variations on a theme by Dalenius and Reiss
-
J. Domingo-Ferrer, V. Torra, eds. Springer-Verlag, Berlin, Germany
-
Fienberg, S. E., J. McIntyre. 2004. Data swapping: Variations on a theme by Dalenius and Reiss. J. Domingo-Ferrer, V. Torra, eds. Privacy in Statistical Databases. Springer-Verlag, Berlin, Germany, 14-29.
-
(2004)
Privacy in Statistical Databases
, pp. 14-29
-
-
Fienberg, S.E.1
McIntyre, J.2
-
18
-
-
0000432739
-
Disclosure limitation using perturbation and related methods for categorical data
-
Fienberg, S. E., U. E. Makov, R. J. Steele. 1998. Disclosure limitation using perturbation and related methods for categorical data. J. Official Statist. 14(4) 485-502.
-
(1998)
J. Official Statist.
, vol.14
, Issue.4
, pp. 485-502
-
-
Fienberg, S.E.1
Makov, U.E.2
Steele, R.J.3
-
20
-
-
0036602405
-
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
-
Garfinkel, R., R. Gopal, P. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Sci. 48(6) 749-764.
-
(2002)
Management Sci.
, vol.48
, Issue.6
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.2
Goes, P.3
-
21
-
-
0002263606
-
Privacy: Entitlement or illusion?
-
Greengard, S. 1996. Privacy: Entitlement or illusion? Personnel J. 75(5) 74-88.
-
(1996)
Personnel J.
, vol.75
, Issue.5
, pp. 74-88
-
-
Greengard, S.1
-
22
-
-
0001582302
-
Post randomization for statistical disclosure control: Theory and implementation
-
Gouweleeuw, J. M., P. Kooiman, L. C. R. J. Willenborg, P.-P. de Wolf. 1998. Post randomization for statistical disclosure control: Theory and implementation. J. Official Statist. 14(4) 463-478.
-
(1998)
J. Official Statist.
, vol.14
, Issue.4
, pp. 463-478
-
-
Gouweleeuw, J.M.1
Kooiman, P.2
Willenborg, L.C.R.J.3
De Wolf, P.-P.4
-
25
-
-
0343506473
-
The determinants of contraceptive method and service point choice
-
Secondary Analysis of the 1987 National Indonesia Contra ceptive Prevalence Survey. East-West Population Institute, Jakarta, Indonesia
-
Lerman, C., J. W. Molyneaux, S. Pangemanan Iswarati. 1991. The determinants of contraceptive method and service point choice. Secondary Analysis of the 1987 National Indonesia Contra ceptive Prevalence Survey, Vol. 1. Fertility and Family Planning. East-West Population Institute, Jakarta, Indonesia.
-
(1991)
Fertility and Family Planning
, vol.1
-
-
Lerman, C.1
Molyneaux, J.W.2
Iswarati, S.P.3
-
26
-
-
85041804889
-
Adaptive data reduction for large-scale transaction data
-
School of Management, University of Texas at Dallas, Richardson, TX
-
Li, X.-B., V. S. Jacob. 2005. Adaptive data reduction for large-scale transaction data. Working paper, School of Management, University of Texas at Dallas, Richardson, TX.
-
(2005)
Working Paper
-
-
Li, X.-B.1
Jacob, V.S.2
-
27
-
-
85041801507
-
A data perturbation approach to privacy protection in data mining
-
School of Management, University of Texas at Dallas, Richardson, TX
-
Li, X.-B., S. Sarkar. 2005. A data perturbation approach to privacy protection in data mining. Working paper, School of Management, University of Texas at Dallas, Richardson, TX.
-
(2005)
Working Paper
-
-
Li, X.-B.1
Sarkar, S.2
-
29
-
-
0033207750
-
A general additive data perturbation method for database security
-
Muralidhar, K., R. Parsa, R. Sarathy. 1999. A general additive data perturbation method for database security. Management Sci. 45(10) 1399-1415.
-
(1999)
Management Sci.
, vol.45
, Issue.10
, pp. 1399-1415
-
-
Muralidhar, K.1
Parsa, R.2
Sarathy, R.3
-
31
-
-
0021389555
-
Practical data-swapping: The first steps
-
Reiss, S. P. 1984. Practical data-swapping: The first steps. ACM Trims. Database Systems 9(1) 20-37.
-
(1984)
ACM Trims. Database Systems
, vol.9
, Issue.1
, pp. 20-37
-
-
Reiss, S.P.1
-
32
-
-
84976841925
-
Protecting privacy
-
Rotenberg, M. 1992. Protecting privacy. Comm. ACM 35(4) 164.
-
(1992)
Comm. ACM
, vol.35
, Issue.4
, pp. 164
-
-
Rotenberg, M.1
-
33
-
-
0036909696
-
The security of confidential numerical data in databases
-
Sarathy, R., K. Muralidhar. 2002. The security of confidential numerical data in databases. Inform. Systems Res. 13(4) 389-403.
-
(2002)
Inform. Systems Res.
, vol.13
, Issue.4
, pp. 389-403
-
-
Sarathy, R.1
Muralidhar, K.2
-
34
-
-
0019546487
-
Security of statistical databases: Multidimensional transformation
-
Schlorer, J. 1981. Security of statistical databases: Multidimensional transformation. ACM Trans. Database Systems 6(1) 95-112.
-
(1981)
ACM Trans. Database Systems
, vol.6
, Issue.1
, pp. 95-112
-
-
Schlorer, J.1
-
35
-
-
33748519734
-
A study of student privacy issues at Stanford University
-
Stanford Student Computer and Network Privacy Project. 2002. A study of student privacy issues at Stanford University. Comm. ACM 45(3) 23-25.
-
(2002)
Comm. ACM
, vol.45
, Issue.3
, pp. 23-25
-
-
-
36
-
-
33748571655
-
Construction of masking error for categorical variables
-
American Statistical Association, Alexandria, VA
-
Sullivan, G., W. A. Fuller. 1990. Construction of masking error for categorical variables. Proc. Section Survey Res. Methods, American Statistical Association, Alexandria, VA, 435-439.
-
(1990)
Proc. Section Survey Res. Methods
, pp. 435-439
-
-
Sullivan, G.1
Fuller, W.A.2
-
37
-
-
2142754478
-
Association rule hiding
-
Verykios, V. S., A. K. Elmagarmid, E. Bertino, Y. Saygin, E. Dasseni. 2004. Association rule hiding. IEEE Trans. Knowledge Data Engrg. 16(4) 434-147.
-
(2004)
IEEE Trans. Knowledge Data Engrg.
, vol.16
, Issue.4
, pp. 434-1147
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
-
38
-
-
0032010369
-
Consumer privacy concerns about Internet marketing
-
Wang, H., M. K. O. Lee, C. Wang. 1998. Consumer privacy concerns about Internet marketing. Comm. ACM 41(3) 63-70.
-
(1998)
Comm. ACM
, vol.41
, Issue.3
, pp. 63-70
-
-
Wang, H.1
Lee, M.K.O.2
Wang, C.3
|