-
1
-
-
12344313039
-
On privacy-preserving access to distributed heterogeneous Healthcare information
-
IEEE Computer Society, Los Alamitos, CA
-
Boyens, C., R. Krishnan, R. Padman. 2004. On privacy-preserving access to distributed heterogeneous Healthcare information. Proc. 37th Annual Hawaii Internat. Conf., on System Sciences (HICSS'04). IEEE Computer Society, Los Alamitos, CA.
-
(2004)
Proc. 37th Annual Hawaii Internat. Conf., on System Sciences (HICSS'04)
-
-
Boyens, C.1
Krishnan, R.2
Padman, R.3
-
2
-
-
0347432367
-
Information preserving statistical obfuscation
-
Burridge, J. 2003. Information preserving statistical obfuscation. Statist. Comput. 13 321-327.
-
(2003)
Statist. Comput.
, vol.13
, pp. 321-327
-
-
Burridge, J.1
-
3
-
-
0033349024
-
Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators
-
Chowdhury, S. D., G. T. Duncan, R. Krishnan, S. F. Rochrig, S. Mukherjee. 1999. Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators. Management Sci. 45(12) 1710-1723.
-
(1999)
Management Sci.
, vol.45
, Issue.12
, pp. 1710-1723
-
-
Chowdhury, S.D.1
Duncan, G.T.2
Krishnan, R.3
Rochrig, S.F.4
Mukherjee, S.5
-
4
-
-
20444440962
-
Assessing the risk of disclosure of confidential categorical data
-
J. Bernardo, ed.. Oxford University Press, Oxford, UK
-
Dobra, A., S. E. Fienberg, M. Trottini. 2003. Assessing the risk of disclosure of confidential categorical data. J. Bernardo, ed. Bayesian Statistics 7, Proceedings of the Seventh Valencia International Meeting on Bayesian Statistics. Oxford University Press, Oxford, UK.
-
(2003)
Bayesian Statistics 7, Proceedings of the Seventh Valencia International Meeting on Bayesian Statistics
-
-
Dobra, A.1
Fienberg, S.E.2
Trottini, M.3
-
5
-
-
26944448516
-
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
-
Domingo-Ferrer, J., V. Torra. 2005. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining Knowledge Discovery. 22(11) 195-212.
-
(2005)
Data Mining Knowledge Discovery.
, vol.22
, Issue.11
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
6
-
-
84948673064
-
Information-theoretic disclosure risk measures in statistical disclosure control of tabular data
-
IEEE Computer Society, Los Alamitos, CA
-
Domingo-Ferrer, J., A. Oganian, V. Torra. 2002. Information-theoretic disclosure risk measures in statistical disclosure control of tabular data. Proc. 14th Internat. Conf. on Scientific and Statistical Database Management (SSDBM '02). IEEE Computer Society, Los Alamitos, CA.
-
(2002)
Proc. 14th Internat. Conf. on Scientific and Statistical Database Management (SSDBM '02)
-
-
Domingo-Ferrer, J.1
Oganian, A.2
Torra, V.3
-
7
-
-
0001751897
-
Disclosure limitation methods and information loss for tabular data
-
Pat Doyle, Julia I. Lane, J. M. Theeuwes, and Laura V. Zayatz, eds.. North-Holland, Amsterdam, The Netherlands
-
Duncan, G. T., S. E. Fienberg, R. Krishnan, R. Padman, S. F. Roehrig. 2001. Disclosure limitation methods and information loss for tabular data. Pat Doyle, Julia I. Lane, J. M. Theeuwes, and Laura V. Zayatz, eds. Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies. North-Holland, Amsterdam, The Netherlands, 135-166.
-
(2001)
Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies
, pp. 135-166
-
-
Duncan, G.T.1
Fienberg, S.E.2
Krishnan, R.3
Padman, R.4
Roehrig, S.F.5
-
8
-
-
84859683094
-
-
Retrieved July 15, 2005
-
Federal Emergency Management Agency. Retrieved July 15, 2005, http://www.fema.gov.
-
-
-
-
10
-
-
0000432739
-
Disclosure limitation using perturbation and related methods for categorical data
-
Fienberg, S. E., U. E. Makov, R. J. Steele. 1998. Disclosure limitation using perturbation and related methods for categorical data. J. Official Statist. 14(4) 485-502.
-
(1998)
J. Official Statist.
, vol.14
, Issue.4
, pp. 485-502
-
-
Fienberg, S.E.1
Makov, U.E.2
Steele, R.J.3
-
11
-
-
0036602405
-
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
-
Garfinkel, R., R. Gopal, P. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Sci. 48(6) 749-764.
-
(2002)
Management Sci.
, vol.48
, Issue.6
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.2
Goes, P.3
-
12
-
-
13844255385
-
Software for tabular data protection
-
Gonzalez, J. F., Jr., L. H. Cox. 2005. Software for tabular data protection. Statist, in Medicine 24(4) 659-669.
-
(2005)
Statist, in Medicine
, vol.24
, Issue.4
, pp. 659-669
-
-
Gonzalez Jr., J.F.1
Cox, L.H.2
-
13
-
-
84867164472
-
Conjugate analysis of the Conway-Maxwell-Poisson distribution
-
Kadane, J. B., G. Shmueli, T. P. Minka, S. Borle, P. Boatwright. 2006. Conjugate analysis of the Conway-Maxwell-Poisson distribution. Bayesian Anal. 1(2) 363-374.
-
(2006)
Bayesian Anal.
, vol.1
, Issue.2
, pp. 363-374
-
-
Kadane, J.B.1
Shmueli, G.2
Minka, T.P.3
Borle, S.4
Boatwright, P.5
-
14
-
-
84957800404
-
Preventing interval-based inference by random data perturbation
-
Springer-Verlag, Berlin, Germany
-
Li, Y., L. Wang, L. Jajodia. 2002. Preventing interval-based inference by random data perturbation. Lecture Notes in Computer Science, Vol. 2482. Springer-Verlag, Berlin, Germany, 160-170.
-
(2002)
Lecture Notes in Computer Science
, vol.2482
, pp. 160-170
-
-
Li, Y.1
Wang, L.2
Jajodia, L.3
-
15
-
-
0036909696
-
The security of confidential numerical data in databases
-
Sarathy, R., K. Muralidhar. 2002. The security of confidential numerical data in databases. Inform. Systems Res. 13(4) 389-403.
-
(2002)
Inform. Systems Res.
, vol.13
, Issue.4
, pp. 389-403
-
-
Sarathy, R.1
Muralidhar, K.2
-
16
-
-
12844278860
-
A useful distribution for fitting discrete data: Revival of the Conway-Maxwell-Poisson distribution
-
Shmueli, G., T. P. Minka, J. B. Kadane, S. Borle, P. Boatwright. 2005. A useful distribution for fitting discrete data: Revival of the Conway-Maxwell-Poisson distribution. J. Royal Statist. Soc. 54(1) 127-142.
-
(2005)
J. Royal Statist. Soc.
, vol.54
, Issue.1
, pp. 127-142
-
-
Shmueli, G.1
Minka, T.P.2
Kadane, J.B.3
Borle, S.4
Boatwright, P.5
-
18
-
-
0036811143
-
Achieving K-anonymity privacy protection using generalization and suppression
-
Sweeney, L. 2002b. Achieving K-anonymity privacy protection using generalization and suppression. Internat. J. Uncertainty, Fuzziness Knowledge-Based Systems 10(5) 571-588.
-
(2002)
Internat. J. Uncertainty, Fuzziness Knowledge-based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
19
-
-
84937307671
-
Toward a theory of word length distributions
-
Wimmer, G., R. Kohler, R. Grotjahn, G. Altmann. 1994. Toward a theory of word length distributions. J. Quant. Linguistics 1 98-106.
-
(1994)
J. Quant. Linguistics
, vol.1
, pp. 98-106
-
-
Wimmer, G.1
Kohler, R.2
Grotjahn, R.3
Altmann, G.4
|