-
1
-
-
1142303699
-
Information sharing across private databases
-
ACM Press, New York
-
AGRAWAL, R., EVFIMIEVSKI, A. and SRIKANT, R. (2003). Information sharing across private databases. In Proc. 2003 ACM SIGMOD International Conference on Management of Data 86-97. ACM Press, New York.
-
(2003)
Proc. 2003 ACM SIGMOD International Conference on Management of Data
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
2
-
-
2342447399
-
Adaptive name matching in information integration
-
BILENKO, M., MOONEY, R., COHEN, W. W., RAVIKUMAR, P. and FIENBERG, S. E. (2003). Adaptive name matching in information integration. IEEE Intelligent Systems 18(5) 16-23.
-
(2003)
IEEE Intelligent Systems
, vol.18
, Issue.5
, pp. 16-23
-
-
Bilenko, M.1
Mooney, R.2
Cohen, W.W.3
Ravikumar, P.4
Fienberg, S.E.5
-
3
-
-
0003756375
-
-
MIT Press, Cambridge, MA. MR0381130
-
BISHOP, Y. M. M., FIENBERG, S. E. and HOLLAND, P. W. (1975). Discrete Multivariate Analysis: Theory and Practice. MIT Press, Cambridge, MA. MR0381130
-
(1975)
Discrete Multivariate Analysis: Theory and Practice
-
-
Bishop, Y.M.M.1
Fienberg, S.E.2
Holland, P.W.3
-
4
-
-
0024011426
-
Information technology and dataveillance
-
CLARKE, R. (1988). Information technology and dataveillance. Comm. ACM 31 498-512.
-
(1988)
Comm. ACM
, vol.31
, pp. 498-512
-
-
Clarke, R.1
-
5
-
-
0035694218
-
Bounds for cell entries in contingency tables induced by fixed marginal totals
-
DOBRA, A. and FIENBERG, S. E. (2001). Bounds for cell entries in contingency tables induced by fixed marginal totals. Statist. J. United Nations ECE 18 363-371.
-
(2001)
Statist. J. United Nations ECE
, vol.18
, pp. 363-371
-
-
Dobra, A.1
Fienberg, S.E.2
-
6
-
-
26944436059
-
Bounding entries in multi-way contingency tables given a set of marginal totals
-
(Y. Haitovsky, H. R. Lerche and Y. Ritov, eds.). Physica, Heidelberg. MR2017809
-
DOBRA, A. and FIENBERG, S. E. (2003). Bounding entries in multi-way contingency tables given a set of marginal totals. In Foundations of Statistical Inference (Y. Haitovsky, H. R. Lerche and Y. Ritov, eds.) 3-16. Physica, Heidelberg. MR2017809
-
(2003)
Foundations of Statistical Inference
, pp. 3-16
-
-
Dobra, A.1
Fienberg, S.E.2
-
7
-
-
84953912234
-
Cryptographic techniques in statistical data protection
-
Office for Official Publications of the European Communities, Luxembourg
-
DOMINGO-FERRER, J., MATEO-SANZ, J. M. and SÁNCHEZ DEL CASTILLO, R. X. (2000). Cryptographic techniques in statistical data protection. In Proc. Joint UN/ECE-Eurostat Work Session on Statistical Data Confidentiality 159-166. Office for Official Publications of the European Communities, Luxembourg.
-
(2000)
Proc. Joint UN/ECE-eurostat Work Session on Statistical Data Confidentiality
, pp. 159-166
-
-
Domingo-Ferrer, J.1
Mateo-Sanz, J.M.2
Sánchez Del Castillo, R.X.3
-
8
-
-
0348062787
-
Disclosure risk assessment in statistical microdata protection via advanced record linkage
-
MR2005437
-
DOMINGO-FERRER, J. and TORRA, V. (2003). Disclosure risk assessment in statistical microdata protection via advanced record linkage. Stat. Comput. 13 343-354. MR2005437
-
(2003)
Stat. Comput.
, vol.13
, pp. 343-354
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
10
-
-
0001751897
-
Disclosure limitation methods and information loss for tabular data
-
(P. Doyle, J. Lane, J. Theeuwes and L. Zayatz, eds.). North-Holland, Amsterdam
-
DUNCAN, G. T., FIENBERG, S. E., KRISHNAN, R., PADMAN, R. and ROEHRIG, S. F. (2001). Disclosure limitation methods and information loss for tabular data. In Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies (P. Doyle, J. Lane, J. Theeuwes and L. Zayatz, eds.) 135-166. North-Holland, Amsterdam.
-
(2001)
Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies
, pp. 135-166
-
-
Duncan, G.T.1
Fienberg, S.E.2
Krishnan, R.3
Padman, R.4
Roehrig, S.F.5
-
11
-
-
33748566653
-
Database security and confidentiality: Examining disclosure risk vs. data utility through the R-U confidentiality map
-
National Institute of Statistical Sciences
-
DUNCAN, G. T., KELLER-MCNULTY, S. A. and STOKES, S. L. (2004). Database security and confidentiality: Examining disclosure risk vs. data utility through the R-U confidentiality map. Technical Report 142, National Institute of Statistical Sciences.
-
(2004)
Technical Report
, vol.142
-
-
Duncan, G.T.1
Keller-McNulty, S.A.2
Stokes, S.L.3
-
12
-
-
20744438219
-
Disclosure risk vs. data utility: The R-U confidentiality map as applied to topcoding
-
MR2061932
-
DUNCAN, G. T. and STOKES, S. L. (2004). Disclosure risk vs. data utility: The R-U confidentiality map as applied to topcoding. Chance 17(3) 16-20. MR2061932
-
(2004)
Chance
, vol.17
, Issue.3
, pp. 16-20
-
-
Duncan, G.T.1
Stokes, S.L.2
-
13
-
-
35048856104
-
Privacy-preserving data mining on vertically partitioned databases
-
Univ. California, Santa Barbara
-
DWORK, C. and NISSIM, K. (2004). Privacy-preserving data mining on vertically partitioned databases. In Proc. CRYPTO 2004, 24th International Conference on Cryptology 528-544. Univ. California, Santa Barbara.
-
(2004)
Proc. CRYPTO 2004, 24th International Conference on Cryptology
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
15
-
-
33748533643
-
Confidentiality and disclosure limitation
-
North-Holland, Amsterdam
-
FIENBERG, S. E. (2005). Confidentiality and disclosure limitation. Encyclopedia of Social Measurement 463-469. North-Holland, Amsterdam.
-
(2005)
Encyclopedia of Social Measurement
, pp. 463-469
-
-
Fienberg, S.E.1
-
16
-
-
83255177748
-
Homeland insecurity: Datamining, terrorism detection, and confidentiality
-
55th Session. Sydney
-
FIENBERG, S. E. (2005). Homeland insecurity: Datamining, terrorism detection, and confidentiality. Bull. Internat. Stat. Inst., 55th Session. Sydney.
-
(2005)
Bull. Internat. Stat. Inst.
-
-
Fienberg, S.E.1
-
17
-
-
13844277022
-
Statistical issues and challenges associated with rapid detection of bio-terrorist attacks
-
MR2134521
-
FIENBERG, S. E. and SHMUELI, G. (2005). Statistical issues and challenges associated with rapid detection of bio-terrorist attacks. Stat. Med. 24 513-529. MR2134521
-
(2005)
Stat. Med.
, vol.24
, pp. 513-529
-
-
Fienberg, S.E.1
Shmueli, G.2
-
18
-
-
26944483284
-
Making the release of confidential data from multi-way tables count
-
MR2061930
-
FIENBERG, S. E. and SLAVKOVIC, A. B. (2004). Making the release of confidential data from multi-way tables count. Chance 17(3) 5-10. MR2061930
-
(2004)
Chance
, vol.17
, Issue.3
, pp. 5-10
-
-
Fienberg, S.E.1
Slavkovic, A.B.2
-
19
-
-
26944471098
-
Preserving the confidentiality of categorical statistical data bases when releasing information for association rules
-
FIENBERG, S. E. and SLAVKOVIC, A. B. (2005). Preserving the confidentiality of categorical statistical data bases when releasing information for association rules. Data Mining and Knowledge Discovery 11 155-180.
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, pp. 155-180
-
-
Fienberg, S.E.1
Slavkovic, A.B.2
-
20
-
-
0036563104
-
Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases
-
MR1910286
-
GOPAL, R., GARFINKEL, R. and GOES, P. (2002). Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases. Oper. Res. 50 501-516. MR1910286
-
(2002)
Oper. Res.
, vol.50
, pp. 501-516
-
-
Gopal, R.1
Garfinkel, R.2
Goes, P.3
-
21
-
-
33748563765
-
-
(chair: J. D. Tygar) Briefing
-
INFORMATION SCIENCE AND TECHNOLOGY STUDY GROUP ON SECURITY AND PRIVACY (chair: J. D. Tygar) (2002). Security With Privacy. Briefing.
-
(2002)
Security with Privacy
-
-
-
22
-
-
0028950887
-
Probabilistic linkage of large public health data files
-
JARO, M. A. (1995). Probabilistic linkage of large public health data files. Stat. Med. 14 491-498.
-
(1995)
Stat. Med.
, vol.14
, pp. 491-498
-
-
Jaro, M.A.1
-
23
-
-
78049354221
-
Secure statistical analysis of distributed databases
-
(A. Wilson, G. Wilson and D. H. Olwell, eds.). Springer, New York
-
KARR, A. F., LIN, X., SANIL, A. P. and REITER, J. P. (2006). Secure statistical analysis of distributed databases. In Statistical Methods in Counterterrorism (A. Wilson, G. Wilson and D. H. Olwell, eds.). Springer, New York.
-
(2006)
Statistical Methods in Counterterrorism
-
-
Karr, A.F.1
Lin, X.2
Sanil, A.P.3
Reiter, J.P.4
-
24
-
-
33744771767
-
Watching the watchers: Surveillance, transparency, and political freedom in the war on terror
-
KREIMER, S. F. (2004). Watching the watchers: Surveillance, transparency, and political freedom in the war on terror. J. Constitutional Law 7 133-181.
-
(2004)
J. Constitutional Law
, vol.7
, pp. 133-181
-
-
Kreimer, S.F.1
-
25
-
-
1842816411
-
Iterative automated record linkage using mixture models
-
LARSEN, M. D. and RUBIN, D. B. (2001). Iterative automated record linkage using mixture models. J. Amer. Statist. Assoc. 96 32-41.
-
(2001)
J. Amer. Statist. Assoc.
, vol.96
, pp. 32-41
-
-
Larsen, M.D.1
Rubin, D.B.2
-
26
-
-
84891471665
-
Private matching
-
(D. T. Lee, S. P. Shieh and J. D. Tygar, eds.). Springer, New York
-
LI, Y., TYGAR, J. D. and HELLERSTEIN, J. M. (2005). Private matching. In Computer Security in the 21st Century (D. T. Lee, S. P. Shieh and J. D. Tygar, eds.) 25-50. Springer, New York.
-
(2005)
Computer Security in the 21st Century
, pp. 25-50
-
-
Li, Y.1
Tygar, J.D.2
Hellerstein, J.M.3
-
27
-
-
33748530478
-
-
Presentation to the Department of Defense Technology and Privacy Advisory Committee, September 29, 2003
-
LUNT, T. (2003). Protecting privacy in terrorist tracking applications. Presentation to the Department of Defense Technology and Privacy Advisory Committee, September 29, 2003.
-
(2003)
Protecting Privacy in Terrorist Tracking Applications
-
-
Lunt, T.1
-
28
-
-
33748567986
-
-
Available at research.microsoft.com/projects/SWSecInstitute/five-minute/ Balfanz5.ppt
-
LUNT, T., STADDON, J., BALFANZ, D., DURFEE, G., URIBE, T. et al. (2005). Protecting privacy in terrorist tracking applications. Powerpoint presentation. Available at research.microsoft.com/projects/SWSecInstitute/five-minute/ Balfanz5.ppt.
-
(2005)
Protecting Privacy in Terrorist Tracking Applications. Powerpoint Presentation
-
-
Lunt, T.1
Staddon, J.2
Balfanz, D.3
Durfee, G.4
Uribe, T.5
-
29
-
-
0035565671
-
An improved security requirement for data perturbation with implications for e-commerce
-
MURALIDHAR, K., SARATHY, R. and PARSA, R. (2001). An improved security requirement for data perturbation with implications for e-commerce. Decision Sci. 32 683-698.
-
(2001)
Decision Sci.
, vol.32
, pp. 683-698
-
-
Muralidhar, K.1
Sarathy, R.2
Parsa, R.3
-
31
-
-
33748562987
-
-
Presented to the Transportation Security Administration, September 19, 2005
-
SECURE FLIGHT WORKING GROUP (2005). Report of the secure flight working group. Presented to the Transportation Security Administration, September 19, 2005. Available at www.epic.org/privacy/airtravel/sfwg_report_091905.pdf.
-
(2005)
Report of the Secure Flight Working Group
-
-
-
32
-
-
84858420537
-
Privacy-preserving bio-terrorism surveillance
-
AI Technologies for Homeland Security, Stanford Univ.
-
SWEENEY, L. (2005). Privacy-preserving bio-terrorism surveillance. Presentation at AAAI Spring Symposium, AI Technologies for Homeland Security, Stanford Univ.
-
(2005)
AAAI Spring Symposium
-
-
Sweeney, L.1
-
33
-
-
33748582457
-
Privacy-preserving surveillance using selective revelation
-
School Computer Science, Carnegie Mellon Univ.
-
SWEENEY, L. (2005). Privacy-preserving surveillance using selective revelation. LIDAP Working Paper 15, School Computer Science, Carnegie Mellon Univ.
-
(2005)
LIDAP Working Paper
, vol.15
-
-
Sweeney, L.1
-
34
-
-
33748568636
-
-
Presentation at Microsoft Research, June 18, 2003. Available at research.microsoft.com/projects/SWSecInstitute/slides/Tygar. pdf
-
TYGAR, J. D. (2003). Privacy architectures. Presentation at Microsoft Research, June 18, 2003. Available at research.microsoft.com/projects/ SWSecInstitute/slides/Tygar. pdf.
-
(2003)
Privacy Architectures
-
-
Tygar, J.D.1
-
35
-
-
35248894946
-
Privacy in sensor webs and distributed information systems
-
(M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa, eds.) Springer. New York
-
TYGAR, J. D. (2003). Privacy in sensor webs and distributed information systems. In Software Security Theories and Systems (M. Okada, B. Pierce, A. Scedrov, H. Tokuda and A. Yonezawa, eds.) 84-95. Springer. New York.
-
(2003)
Software Security Theories and Systems
, pp. 84-95
-
-
Tygar, J.D.1
-
36
-
-
10844295309
-
-
Department of Defense, Washington
-
U.S. DEPARTMENT OF DEFENSE TECHNOLOGY AND PRIVACY ADVISORY COMMITTEE (TAPAC) (2004). Safeguarding Privacy in the Fight Against Terrorism. Department of Defense, Washington.
-
(2004)
Safeguarding Privacy in the Fight Against Terrorism
-
-
-
37
-
-
26844471597
-
-
GAO-04-548, Report to the Ranking Minority Member, Subcommittee on Financial Management, the Budget and International Security. Committee on Governmental Affairs, U.S. Senate, Washington
-
U.S. GENERAL ACCOUNTING OFFICE (2004). Data Mining: Federal Efforts Cover a Wide Range of Uses. GAO-04-548, Report to the Ranking Minority Member, Subcommittee on Financial Management, the Budget and International Security. Committee on Governmental Affairs, U.S. Senate, Washington.
-
(2004)
Data Mining: Federal Efforts Cover a Wide Range of Uses
-
-
-
38
-
-
2942741943
-
Methods for record linkage and Bayesian networks
-
Amer. Statist. Assoc., Alexandria, VA
-
WINKLER, W. E. (2002). Methods for record linkage and Bayesian networks. Proc. Section Survey Research Methods 3743-3748. Amer. Statist. Assoc., Alexandria, VA.
-
(2002)
Proc. Section Survey Research Methods
, pp. 3743-3748
-
-
Winkler, W.E.1
|