-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
December
-
N. R. Adam and J. C. Wortmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21(4):515-556, December 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
5
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
A. Brodsky, G. Farkas, and S. Jajodia. Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Transactions on Knowledge and Data Engineering, 12(6):900-919, 2000.
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, G.2
Jajodia, S.3
-
6
-
-
24144487020
-
Toward privacy in public databases
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In Theory of Cryptography, Second Theory of Cryptography Conference (TCC), pages 363-385, 2005.
-
(2005)
Theory of Cryptography, Second Theory of Cryptography Conference (TCC)
, pp. 363-385
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
10
-
-
0242625281
-
Privacy preserving mining of association rules
-
A. V. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pages 217-228, 2002.
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
, pp. 217-228
-
-
Evfimievski, A.V.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
11
-
-
0040863368
-
Privacy and the limits of the law
-
D. G. Johnson and H. Nissenbaum, editors
-
R. Gavison. Privacy and the limits of the law. In D. G. Johnson and H. Nissenbaum, editors, Computers, Ethics, and Social Values. 1995.
-
(1995)
Computers, Ethics, and Social Values
-
-
Gavison, R.1
-
13
-
-
62749157065
-
Branch-and-price-and-cut on clique partition problem with minimum clique size requirement
-
X. Ji and J. E. Mitchell. Branch-and-price-and-cut on clique partition problem with minimum clique size requirement. In IMA Special Workshop: Mixed-Integer Programming, 2005.
-
(2005)
IMA Special Workshop: Mixed-integer Programming
-
-
Ji, X.1
Mitchell, J.E.2
-
19
-
-
33749607006
-
1-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. 1-diversity: Privacy beyond k-anonymity. In Proceedings of the 22nd International Conference on Data Engineering (ICDE), pages 24-35, 2006.
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering (ICDE)
, pp. 24-35
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
24
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati. Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6):1010-1027, 2001.
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
27
-
-
33745599656
-
Checking for k-anonymity violation, by views
-
C. Yao, X. S. Wang, and S. Jajodia. Checking for k-anonymity violation, by views. In Proceedings of the 31st International Conference on Very Large Data Bases (VLDB), pages 910-921, 2005.
-
(2005)
Proceedings of the 31st International Conference on Very Large Data Bases (VLDB)
, pp. 910-921
-
-
Yao, C.1
Wang, X.S.2
Jajodia, S.3
|