-
1
-
-
0003515463
-
-
Prentice-Hall, Inc, Upper Saddle River, NJ, USA
-
R. K. Ahuja, T. L. Magnanti, and J. B. Orlin. Network flows: theory, algorithms, and applications. Prentice-Hall, Inc., Upper Saddle River, NJ, USA, 1993.
-
(1993)
Network flows: Theory, algorithms, and applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
2
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
Washington, DC, USA, IEEE Computer Society
-
R. J. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In Proc. 21st Intnl. Conf. Data Engg. (ICDE), pages 217-228, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proc. 21st Intnl. Conf. Data Engg. (ICDE)
, pp. 217-228
-
-
Bayardo, R.J.1
Agrawal, R.2
-
3
-
-
0001751897
-
Disclosure limitation methods and information loss for tabular data
-
Elsevier
-
G. T. Duncan, S. E. Fienberg, R. Krishnan, R. Padman, and S. F. Roehrig. Disclosure limitation methods and information loss for tabular data. In Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, pages 135-166. Elsevier, 2001.
-
(2001)
Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies
, pp. 135-166
-
-
Duncan, G.T.1
Fienberg, S.E.2
Krishnan, R.3
Padman, R.4
Roehrig, S.F.5
-
4
-
-
84950825763
-
Disclosure-limited data dissemination
-
G. T. Duncan and D. Lambert. Disclosure-limited data dissemination. J. Am. Stat. Assoc., pages 10-28, 1986.
-
(1986)
J. Am. Stat. Assoc
, pp. 10-28
-
-
Duncan, G.T.1
Lambert, D.2
-
5
-
-
0000797976
-
A class of Wasserstein metrics for probability distributions
-
C. R. Givens and R. M. Shortt. A class of Wasserstein metrics for probability distributions. Michigan Math J., 31:231-240, 1984.
-
(1984)
Michigan Math J
, vol.31
, pp. 231-240
-
-
Givens, C.R.1
Shortt, R.M.2
-
6
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. S. Iyengar. Transforming data to satisfy privacy constraints. In Proc. 8th ACM KDD, pages 279-288, 2002.
-
(2002)
Proc. 8th ACM KDD
, pp. 279-288
-
-
Iyengar, V.S.1
-
9
-
-
0000964471
-
Measures of disclosure risk and harm
-
D. Lambert. Measures of disclosure risk and harm. J. Official Stat., 9:313, 1993.
-
(1993)
J. Official Stat
, vol.9
, pp. 313
-
-
Lambert, D.1
-
12
-
-
33749607006
-
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond k-anonymity. In Proc. 22nd Intnl. Conf. Data Engg. (ICDE), page 24, 2006.
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond k-anonymity. In Proc. 22nd Intnl. Conf. Data Engg. (ICDE), page 24, 2006.
-
-
-
-
13
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
ACM Press
-
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In PODS, pages 223-228. ACM Press, 2004.
-
(2004)
PODS
, pp. 223-228
-
-
Meyerson, A.1
Williams, R.2
-
14
-
-
0034313871
-
The earth mover's distance as a metric for image retrieval
-
Y. Rubner, C. Tomasi, and L. J. Guibas. The earth mover's distance as a metric for image retrieval. Int. J. Comput. Vision, 40(2):99-121, 2000.
-
(2000)
Int. J. Comput. Vision
, vol.40
, Issue.2
, pp. 99-121
-
-
Rubner, Y.1
Tomasi, C.2
Guibas, L.J.3
-
15
-
-
0035517699
-
Protecting respondent's privacy in microdata release
-
P. Samarati. Protecting respondent's privacy in microdata release. IEEE T. Knowl. Data En., 13(6): 1010-1027, 2001.
-
(2001)
IEEE T. Knowl. Data En
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
16
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory
-
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory, 1998.
-
(1998)
-
-
Samarati, P.1
Sweeney, L.2
-
17
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzz., 10(6):571-588, 2002.
-
(2002)
Int. J. Uncertain. Fuzz
, vol.10
, Issue.6
, pp. 571-588
-
-
Sweeney, L.1
-
18
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney. K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzz., 10(5):557-570, 2002.
-
(2002)
Int. J. Uncertain. Fuzz
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
|