-
1
-
-
0024914229
-
Security-Control Methods for Statistical Databases: A Comparative Study
-
N. Adam, and J. Wortman. Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys, 21(4), 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
-
-
Adam, N.1
Wortman, J.2
-
2
-
-
34548726867
-
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. P. raby, D. Thomas, and A. Zhu. k-Anonymity: Algorithms and Hardness. Technical report, Stanford University, 2004.
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. P. raby, D. Thomas, and A. Zhu. k-Anonymity: Algorithms and Hardness. Technical report, Stanford University, 2004.
-
-
-
-
5
-
-
34548746451
-
Aggregate Query Answering on Anonymized Tables
-
Technical Report TR-2006-16, North Carolina State University
-
N. Koudas, D. Srivastava, T. Yu, and Q. Zhang. Aggregate Query Answering on Anonymized Tables. Technical Report TR-2006-16, North Carolina State University, 2006.
-
(2006)
-
-
Koudas, N.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
6
-
-
29844444250
-
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito -Efficient Full-Domain K-Anonymity. In In Proceedings of ACM SIGMOD Conference, Baltimore, MD, June 2005.
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito -Efficient Full-Domain K-Anonymity. In In Proceedings of ACM SIGMOD Conference, Baltimore, MD, June 2005.
-
-
-
-
7
-
-
34548805858
-
-
N. Li, T. Li, and S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity. In Proceedings of IEEE International Conference on Data Engineering, 2007.
-
N. Li, T. Li, and S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity. In Proceedings of IEEE International Conference on Data Engineering, 2007.
-
-
-
-
8
-
-
33749607006
-
Diversity: Privacy Beyond k-Anonymity
-
ℓ, Atlanta, GA, Apr
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. ℓ-Diversity: Privacy Beyond k-Anonymity. In IEEE International Conference on Data Engineering, Atlanta, GA, Apr. 2006.
-
(2006)
IEEE International Conference on Data Engineering
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
9
-
-
10944249990
-
Controlled Data-Swapping Techniques for Masking Public Use Microdata Sets
-
RR 96-04, US Bureau of Census
-
R. Moore. Controlled Data-Swapping Techniques for Masking Public Use Microdata Sets. Technical Report Statistical Research Division Report Series, RR 96-04, US Bureau of Census, 1996.
-
(1996)
Technical Report Statistical Research Division Report Series
-
-
Moore, R.1
-
14
-
-
33745599656
-
Checking for k-Anonymity Violiation by Views
-
Trondheim, Norway, Aug
-
C. Yao, S. Wang, and S. Jajodia. Checking for k-Anonymity Violiation by Views. In International Conference on Very Large Data Bases, Trondheim, Norway, Aug. 2005.
-
(2005)
International Conference on Very Large Data Bases
-
-
Yao, C.1
Wang, S.2
Jajodia, S.3
|