-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. R. Adam and J. C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21(4):515-556, 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
-
2
-
-
33745629638
-
On k-anonymity and the curse of dimensionality
-
C. C. Aggarwal. On k-anonymity and the curse of dimensionality. In VLDB, pages 901-909, 2005.
-
(2005)
VLDB
, pp. 901-909
-
-
Aggarwal, C.C.1
-
3
-
-
77049087087
-
Anonymizing tables
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In ICDT, pages 246-258, 2005.
-
(2005)
ICDT
, pp. 246-258
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
5
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, pages 217-228, 2005.
-
(2005)
ICDE
, pp. 217-228
-
-
Bayardo, R.1
Agrawal, R.2
-
6
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
7
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In ICDE, pages 205-216, 2005.
-
(2005)
ICDE
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
8
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. Iyengar. Transforming data to satisfy privacy constraints. In SIGKDD, pages 279-288, 2002.
-
(2002)
SIGKDD
, pp. 279-288
-
-
Iyengar, V.1
-
9
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In SIGMOD, pages 49-60, 2005.
-
(2005)
SIGMOD
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
12
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In PODS, pages 223-228, 2004.
-
(2004)
PODS
, pp. 223-228
-
-
Meyerson, A.1
Williams, R.2
-
13
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati. Protecting respondents' identities in microdata release. TKDE, 13(6): 1010-1027, 2001.
-
(2001)
TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
14
-
-
0030157416
-
Mining quantitative association rules in large relational tables
-
R. Srikant and R. Agrawal. Mining quantitative association rules in large relational tables. In SIGMOD, pages 1-12, 1996.
-
(1996)
SIGMOD
, pp. 1-12
-
-
Srikant, R.1
Agrawal, R.2
-
17
-
-
19544380211
-
Bottom-up generalization: A data mining solution to privacy protection
-
K. Wang, P. S. Yu, and S. Chakraborty. Bottom-up generalization: A data mining solution to privacy protection. In ICDM, pages 249-256, 2004.
-
(2004)
ICDM
, pp. 249-256
-
-
Wang, K.1
Yu, P.S.2
Chakraborty, S.3
-
18
-
-
33745599656
-
Checking for k-anonymity violation by views
-
C. Yao, X. S. Wang, and S. Jajodia. Checking for k-anonymity violation by views. In VLDB, pages 910-921, 2005.
-
(2005)
VLDB
, pp. 910-921
-
-
Yao, C.1
Wang, X.S.2
Jajodia, S.3
-
19
-
-
33244463520
-
Privacy-enhancing k-anonymization of customer data
-
S. Zhong, Z. Yang, and R. N. Wright. Privacy-enhancing k-anonymization of customer data. In PODS, pages 139-147, 2005.
-
(2005)
PODS
, pp. 139-147
-
-
Zhong, S.1
Yang, Z.2
Wright, R.N.3
|