-
1
-
-
33746052559
-
Anonymizing tables
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In ICDT, 2005.
-
(2005)
ICDT
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
2
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In IEEE ICDE, pages 217-228, 2005.
-
(2005)
IEEE ICDE
, pp. 217-228
-
-
Bayardo, R.1
Agrawal, R.2
-
3
-
-
0034497773
-
Using sample size to limit exposure to data mining
-
C. Clifton. Using sample size to limit exposure to data mining. Journal of Computer Security, 8(4):281-307, 2000.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.4
, pp. 281-307
-
-
Clifton, C.1
-
5
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
April
-
B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In IEEE ICDE, pages 205-216, April 2005.
-
(2005)
IEEE ICDE
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
6
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. S. Iyengar. Transforming data to satisfy privacy constraints. In ACM SIGKDD, pages 279-288, 2002.
-
(2002)
ACM SIGKDD
, pp. 279-288
-
-
Iyengar, V.S.1
-
7
-
-
34250673244
-
Injecting utility into anonymized datasets
-
Chicago, IL, June
-
D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In ACM SIGMOD, Chicago, IL, June 2006.
-
(2006)
ACM SIGMOD
-
-
Kifer, D.1
Gehrke, J.2
-
11
-
-
2942522665
-
How to protect genomic data privacy in a distributed network
-
B. Malin and L. Sweeney. How to protect genomic data privacy in a distributed network. In Journal of Biomed Info, 37(3): 179-192, 2004.
-
(2004)
Journal of Biomed Info
, vol.37
, Issue.3
, pp. 179-192
-
-
Malin, B.1
Sweeney, L.2
-
12
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In PODS, 2004.
-
(2004)
PODS
-
-
Meyerson, A.1
Williams, R.2
-
13
-
-
3142686877
-
A formal analysis of information disclosure in data exchange
-
G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In ACM SIGMOD, 2004.
-
(2004)
ACM SIGMOD
-
-
Miklau, G.1
Suciu, D.2
-
16
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati. Protecting respondents' identities in microdata release. IEEE TKDE, 13(6):1010-1027, 2001.
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
17
-
-
4344559647
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
May
-
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In IEEE Symposium on Research in Security and Privacy, May 1998.
-
(1998)
IEEE Symposium on Research in Security and Privacy
-
-
Samarati, P.1
Sweeney, L.2
-
18
-
-
84856043672
-
A mathematical theory of communication
-
C. E. Shannon. A mathematical theory of communication. The Bell System Technical Journal, 27:379 and 623, 1948.
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 379
-
-
Shannon, C.E.1
-
20
-
-
33749559842
-
Integrating private databases for data analysis
-
May
-
K. Wang, B. C. M. Fung, and G. Dong. Integrating private databases for data analysis. In IEEE ISI, May 2005.
-
(2005)
IEEE ISI
-
-
Wang, K.1
Fung, B.C.M.2
Dong, G.3
-
21
-
-
33749546201
-
Template-based privacy preservation in classification problems
-
November
-
K. Wang, B. C. M. Fung, and P. S. Yu. Template-based privacy preservation in classification problems. In IEEE ICDM, pages 466-473, November 2005.
-
(2005)
IEEE ICDM
, pp. 466-473
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
23
-
-
33749580222
-
Bottom-up generalization: A data mining solution to privacy protection
-
November
-
K. Wang, P. S. Yu, and S. Chakraborty. Bottom-up generalization: A data mining solution to privacy protection. In IEEE ICDM, November 2004.
-
(2004)
IEEE ICDM
-
-
Wang, K.1
Yu, P.S.2
Chakraborty, S.3
-
24
-
-
33749571958
-
(α,k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing
-
R. C. W. Wong, J. Li., A. W. C. Fu, and K. Wang. (α,k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In ACM SIGKDD, 2006.
-
(2006)
ACM SIGKDD
-
-
Wong, R.C.W.1
Li, J.2
Fu, A.W.C.3
Wang, K.4
-
25
-
-
34250680246
-
Personalized privacy preservation
-
June
-
X. Xiao and Y. Tao. Personalized privacy preservation. In ACM SIGMOD, June 2006.
-
(2006)
ACM SIGMOD
-
-
Xiao, X.1
Tao, Y.2
-
26
-
-
33745599656
-
Checking for k-anonymity violation by views
-
C. Yao, X. S. Wang, and S. Jajodia. Checking for k-anonymity violation by views. In VLDB, 2005.
-
(2005)
VLDB
-
-
Yao, C.1
Wang, X.S.2
Jajodia, S.3
|