-
2
-
-
0035517699
-
Protecting Respondents' Identities in Microdata Release
-
Nov./Dec
-
P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Trans, Knowledge Eng., vol. 13, no. 6, pp. 1010-1027, Nov./Dec. 2001.
-
(2001)
IEEE Trans, Knowledge Eng
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
3
-
-
34047177790
-
-
The Personal Information Protection and Electronic Documents Act
-
The House of Commons in Canada, "The Personal Information Protection and Electronic Documents Act," 1991, http://www.privcom.gc.ca/.
-
(1991)
The House of Commons in Canada
-
-
-
5
-
-
0000072558
-
Finding a Needle in a Haystack - or Identifying Anonymous Census Record
-
T. Dalenius, "Finding a Needle in a Haystack - or Identifying Anonymous Census Record," J. Official Statistics, vol. 2, no. 3, pp. 329-336, 1986.
-
(1986)
J. Official Statistics
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
6
-
-
0036811143
-
Achieving k-Anonymity Privacy Protection Using Generalization and Suppression
-
L. Sweeney, "Achieving k-Anonymity Privacy Protection Using Generalization and Suppression," Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, vol. 10, no. 5, pp. 571-588, 2002.
-
(2002)
Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
8
-
-
33746711412
-
Approximation Algorithms for k-Anonymity
-
1 20051120001 Nov
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigraphy, D. Thomas, and A. Zhu, "Approximation Algorithms for k-Anonymity," J. Privacy Technology, no. 20051120001, Nov. 2005.
-
(2005)
J. Privacy Technology
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigraphy, R.5
Thomas, D.6
Zhu, A.7
-
10
-
-
0242698173
-
Datafly: A System for Providing Anonymity in Medical Data
-
L. Sweeney, "Datafly: A System for Providing Anonymity in Medical Data," Proc. Int'l Conf. Database Security, pp. 356-381, 1998.
-
(1998)
Proc. Int'l Conf. Database Security
, pp. 356-381
-
-
Sweeney, L.1
-
14
-
-
28444499680
-
Top-Down Specialization for Information and Privacy Preservation
-
Apr
-
B.C.M. Fung, K. Wang, and P.S. Yu, "Top-Down Specialization for Information and Privacy Preservation," Proc. 21st Int'l Conf. Data Eng. (ICDE '05), pp. 205-216, Apr. 2005.
-
(2005)
Proc. 21st Int'l Conf. Data Eng. (ICDE '05)
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
15
-
-
33749571958
-
-
α, k-Anonymity: An Enhanced k-Anonymity Model for Privacy Preserving Data Publishing, Aug
-
R.C.W. Wong, J. Li, A.W.C. Fu, and K. Wang, "(α, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy Preserving Data Publishing," Proc. 12th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '06), Aug. 2006.
-
(2006)
Proc. 12th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '06)
-
-
Wong, R.C.W.1
Li, J.2
Fu, A.W.C.3
Wang, K.4
-
16
-
-
29844444250
-
Incognito: Efficient Full-Domain k-Anonymity
-
K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, "Incognito: Efficient Full-Domain k-Anonymity," Proc. 2005 .ACM SIGMOD Int'l Conf. Management of Data, pp. 49-60, 2005.
-
(2005)
Proc. 2005 .ACM SIGMOD Int'l Conf. Management of Data
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
19
-
-
33749582207
-
Utility-Based Anonymization Using Local Recoding
-
Aug
-
J. Xu, W. Wang, X. Pei, B. Wang, B. Xie, and A.W.C. Fu, "Utility-Based Anonymization Using Local Recoding," Proc. 12th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '06), Aug. 2006.
-
(2006)
Proc. 12th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD '06)
-
-
Xu, J.1
Wang, W.2
Pei, X.3
Wang, B.4
Xie, B.5
Fu, A.W.C.6
-
21
-
-
33749568934
-
Template-Based Privacy Preservation in Classification Problems
-
Nov
-
K. Wang, B.C.M. Fung, and P.S. Yu, "Template-Based Privacy Preservation in Classification Problems," Proc. Fifth IEEE Int'l Conf. Data Mining (ICDM '05), pp. 466-473, Nov. 2005.
-
(2005)
Proc. Fifth IEEE Int'l Conf. Data Mining (ICDM '05)
, pp. 466-473
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
24
-
-
24944455555
-
Integrating Private Databases for Data Analysis
-
May
-
K. Wang, B.C.M. Fung, and G. Dong, "Integrating Private Databases for Data Analysis," Proc. 2005 IEEE Int'l Conf. Intelligence and Security Informatics (ISI '05), pp. 171-182, May 2005.
-
(2005)
Proc. 2005 IEEE Int'l Conf. Intelligence and Security Informatics (ISI '05)
, pp. 171-182
-
-
Wang, K.1
Fung, B.C.M.2
Dong, G.3
-
26
-
-
84856043672
-
A Mathematical Theory of Communication
-
C.E. Shannon, "A Mathematical Theory of Communication," The Bell System Technical J., vol. 27, pp. 379-623, 1948.
-
(1948)
The Bell System Technical J
, vol.27
, pp. 379-623
-
-
Shannon, C.E.1
|