-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Dec. [Online]. Available: http://doi.acm.org/10.1145/76894.76895
-
N. R. Adam and J. C. Wortmann, "Security-control methods for statistical databases: A comparative study," ACM Computing Surveys, vol. 21, no. 4, pp. 515-556, Dec. 1989. [Online]. Available: http://doi.acm.org/10. 1145/76894.76895
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
2
-
-
1142303699
-
Information sharing across private databases
-
[Online]. Available: http://doi.acm.org/10.1145/872757.872771
-
R. Agrawal, A. Evfimievski, and R. Srikant, "Information sharing across private databases," in Proceedings of ACM SIGMOD International Conference on Management of Data, San Diego, California, June 9-12 2003. [Online]. Available: http://doi.acm.org/10.1145/872757.872771
-
Proceedings of ACM SIGMOD International Conference on Management of Data, San Diego, California, June 9-12 2003
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
3
-
-
0242674432
-
Hippocratic databases
-
[Online]. Available
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Hippocratic databases," in Proceedings of the 28th International Conference on Very Large Databases, Hong Kong, Aug. 20-23 2002, pp. 143-154. [Online]. Available: http://www.vldb.org/conf/2002/S05P02.pdf
-
Proceedings of the 28th International Conference on Very Large Databases, Hong Kong, Aug. 20-23 2002
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
4
-
-
77954694081
-
Secure supply-chain protocols
-
[Online]. Available
-
M. J. Atallah, H. G. Elmongui, V. Deshpande, and L. B. Schwarz, "Secure supply-chain protocols," in IEEE International Conference on E-Commerce, Newport Beach, California, June 24-27 2003, pp. 293-302. [Online]. Available: http://ieeexplore.ieee.org/xpl/citationdwnld.jsp?arNumber=1210264
-
IEEE International Conference on E-Commerce, Newport Beach, California, June 24-27 2003
, pp. 293-302
-
-
Atallah, M.J.1
Elmongui, H.G.2
Deshpande, V.3
Schwarz, L.B.4
-
6
-
-
77953994474
-
Logical vs. numerical inference on statistical databases
-
S. D. Chowdhury, G. T. Duncan, R. Krishnan, S. Roehrig, and S. Mukherjee, "Logical vs. numerical inference on statistical databases," in Proceedings of the Twenty-Ninth Hawaii International Conference on System Sciences, Jan. 3-6 1996, pp. 3-10.
-
Proceedings of the Twenty-Ninth Hawaii International Conference on System Sciences, Jan. 3-6 1996
, pp. 3-10
-
-
Chowdhury, S.D.1
Duncan, G.T.2
Krishnan, R.3
Roehrig, S.4
Mukherjee, S.5
-
7
-
-
0344303378
-
Experience with a combined approach to attribute-matching across heterogeneous databases
-
Leysin, Switzerland: Chapman & Hall, Oct. 7-10
-
C. Clifton, E. Housman, and A. Rosenthal, "Experience with a combined approach to attribute-matching across heterogeneous databases," in 7th IFIP 2.6 Working Conference on Database Semantics. Leysin, Switzerland: Chapman & Hall, Oct. 7-10 1997, pp. 428-451.
-
(1997)
7th IFIP 2.6 Working Conference on Database Semantics
, pp. 428-451
-
-
Clifton, C.1
Housman, E.2
Rosenthal, A.3
-
8
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Jan. [Online]. Available
-
C. Clifton, M. Kantarcioglu, X. Lin, J. Vaidya, and M. Zhu, "Tools for privacy preserving distributed data mining," SIGKDD Explorations, vol. 4, no. 2, pp. 28-34, Jan. 2003. [Online]. Available: http://www.acm.org/sigs/ sigkdd/explorations/issue4-2/contents.htm
-
(2003)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Lin, X.3
Vaidya, J.4
Zhu, M.5
-
9
-
-
0029792710
-
Protecting confidentiality in small population health and environmental statistics
-
L. H. Cox, "Protecting confidentiality in small population health and environmental statistics," Statistics in Medicine, vol. 15, pp. 1895-1905, 1996.
-
(1996)
Statistics in Medicine
, vol.15
, pp. 1895-1905
-
-
Cox, L.H.1
-
10
-
-
0013243382
-
-
Apr. 16 [Online]. Available
-
L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, and J. Reagle, "The platform for privacy preferences 1.0 (P3P1.0) specification," Apr. 16 2002. [Online]. Available: http://www.w3.org/TR/ P3P/
-
(2002)
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification
-
-
Cranor, L.1
Langheinrich, M.2
Marchiori, M.3
Presler-Marshall, M.4
Reagle, J.5
-
11
-
-
0019054751
-
Secure statistical databases with random sample queries
-
Sept. [Online]. Available: http://doi.acm.org/10.1145/320613.320616
-
D. E. Denning, "Secure statistical databases with random sample queries," ACM Transactions on Database Systems, vol. 5, no. 3, pp. 291-315, Sept. 1980. [Online]. Available: http://doi.acm.org/10.1145/320613.320616
-
(1980)
ACM Transactions on Database Systems
, vol.5
, Issue.3
, pp. 291-315
-
-
Denning, D.E.1
-
12
-
-
0037365358
-
Learning to match the schemas of databases: A multistrategy approach
-
[Online]. Available
-
A. Doan, P. Domingos, and A. Halevy, "Learning to match the schemas of databases: A multistrategy approach," Machine Learning Journal, vol. 50, pp. 279-301, 2003. [Online]. Available: http://anhai.cs.uiuc.edu/home/papers/ lsd-mlj03.pdf
-
(2003)
Machine Learning Journal
, vol.50
, pp. 279-301
-
-
Doan, A.1
Domingos, P.2
Halevy, A.3
-
13
-
-
0018444418
-
Secure databases: Protection against user influence
-
Mar. [Online]. Available: http://doi.acm.org/10.1145/320064.320068
-
D. Dobkin, A. K. Jones, and R. J. Lipton, "Secure databases: Protection against user influence," ACM Transactions on Database Systems, vol. 4, no. 1, pp. 97-106, Mar. 1979. [Online]. Available: http://doi.acm.org/ 10.1145/320064.320068
-
(1979)
ACM Transactions on Database Systems
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.K.2
Lipton, R.J.3
-
14
-
-
0011583645
-
-
National Institute of Statistical Sciences, Tech. Rep. 121, Dec [Online]. Available
-
G. T. Duncan, S. A. Keller-McNulty, and S. L. Stokes, "Disclosure risk vs. data utility: The r-u confidentiality map," National Institute of Statistical Sciences, Tech. Rep. 121, Dec 2001. [Online]. Available: http://www.niss.org/technicalreports/tr121.pdf
-
(2001)
Disclosure Risk vs. Data Utility: The r-u Confidentiality Map
-
-
Duncan, G.T.1
Keller-McNulty, S.A.2
Stokes, S.L.3
-
15
-
-
0036203458
-
TAILOR: A record linkage toolbox
-
M. Elfeky, V. Verykios, and A. Elmagarmid, "TAILOR: A record linkage toolbox," in Proceedings of the 18th International Conference on Data Engineering, San Jose, California, Feb. 2002.
-
Proceedings of the 18th International Conference on Data Engineering, San Jose, California, Feb. 2002
-
-
Elfeky, M.1
Verykios, V.2
Elmagarmid, A.3
-
16
-
-
0013331361
-
Real world data is dirty: Data cleansing and the merge/purge problem
-
M. Hernandez and S. Stolfo, "Real world data is dirty: Data cleansing and the merge/purge problem," Journal of Data Mining and Knowledge Discovery, vol. 2, no. 1, pp. 9-37, 1998.
-
(1998)
Journal of Data Mining and Knowledge Discovery
, vol.2
, Issue.1
, pp. 9-37
-
-
Hernandez, M.1
Stolfo, S.2
-
17
-
-
12244257240
-
Assuring privacy when big brother is watching
-
[Online]. Available: http://doi.acm.org/10.1145/882082.882102
-
M. Kantarcioǧlu and C. Clifton, "Assuring privacy when big brother is watching," in The 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD'2003), San Diego, California, June 13 2003. [Online]. Available: http://doi.acm.org/10.1145/882082.882102
-
The 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (DMKD'2003), San Diego, California, June 13 2003
-
-
Kantarcioǧlu, M.1
Clifton, C.2
-
18
-
-
77954004564
-
-
July 17, title VIII section 8120. Enacted as Public Law 108-87 [Online]. Available
-
M. Lewis, "Department of defense appropriations act, 2004," July 17 2003, title VIII section 8120. Enacted as Public Law 108-87. [Online]. Available: http://thomas.loc.gov/cgi-bin/bdquery/z?d108:h.r.02658:
-
(2003)
Department of Defense Appropriations Act, 2004
-
-
Lewis, M.1
-
19
-
-
0034173996
-
SEMINT: A tool for identifying attribute correspondences in heterogeneous databases using neural networks
-
Apr. [Online]. Available: http://dx.doi.org/10.1016/S0169-023X(99)00044-0
-
W.-S. Li and C. Clifton, "SEMINT: A tool for identifying attribute correspondences in heterogeneous databases using neural networks," Data and Knowledge Engineering, vol. 33, no. 1, pp. 49-84, Apr. 2000. [Online]. Available: http://dx.doi.org/10.1016/S0169-023X(99)00044-0
-
(2000)
Data and Knowledge Engineering
, vol.33
, Issue.1
, pp. 49-84
-
-
Li, W.-S.1
Clifton, C.2
-
20
-
-
33746437508
-
Privacy preserving data mining
-
[Online]. Available
-
Y. Lindell and B. Pinkas, "Privacy preserving data mining," Journal of Cryptology, vol. 15, no. 3, pp. 177-206, 2002. [Online]. Available: http://www.research.ibm.com/people/l/lindell//id3 abs.html
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
21
-
-
0030084794
-
Inference in MLS database systems
-
Feb.
-
D. G. Marks, "Inference in MLS database systems," IEEE Trans. Knowledge Data Eng., vol. 8, no. 1, Feb. 1996.
-
(1996)
IEEE Trans. Knowledge Data Eng.
, vol.8
, Issue.1
-
-
Marks, D.G.1
-
22
-
-
85009120801
-
Controlling access to published data using cryptography
-
Berlin, Germany: Morgan-Kaufmann, Sept. 9-12 [Online]. Available
-
G. Miklau and D. Suciu, "Controlling access to published data using cryptography," in Proceedings of 29th International Conference on Very Large Data Bases (VLDB 2003). Berlin, Germany: Morgan-Kaufmann, Sept. 9-12 2003, pp. 898-909. [Online]. Available: http://www.vldb.org/conf/2003/papers/S27P01. pdf
-
(2003)
Proceedings of 29th International Conference on Very Large Data Bases (VLDB 2003)
, pp. 898-909
-
-
Miklau, G.1
Suciu, D.2
-
23
-
-
0035657983
-
On matching schemas automatically
-
E. Rahm and P. Bernstein, "On matching schemas automatically," VLDB Journal, vol. 10, no. 4, 2001.
-
(2001)
VLDB Journal
, vol.10
, Issue.4
-
-
Rahm, E.1
Bernstein, P.2
-
24
-
-
36048933310
-
Privacy-preserving distributed queries for a clinical case research network
-
C. Clifton and V. Estivill-Castro, Eds., Maebashi City, Japan: Australian Computer Society, Dec. 9 [Online]. Available
-
G. Schadow, S. J. Grannis, and C. J. McDonald, "Privacy-preserving distributed queries for a clinical case research network," in IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, C. Clifton and V. Estivill-Castro, Eds., vol. 14. Maebashi City, Japan: Australian Computer Society, Dec. 9 2002, pp. 55-65. [Online]. Available: http://crpit.com/Vol14.html
-
(2002)
IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining
, vol.14
, pp. 55-65
-
-
Schadow, G.1
Grannis, S.J.2
McDonald, C.J.3
-
25
-
-
10944273551
-
Don't store my data, Japanese tell government
-
Aug. 24-25
-
D. Struck, "Don't store my data, Japanese tell government," International Herald Tribune, p. 1, Aug. 24-25 2002.
-
(2002)
International Herald Tribune
, pp. 1
-
-
Struck, D.1
-
26
-
-
0043029204
-
Technical description of RODS: A real-time public health surveillance system
-
Sept.
-
F.-C. Tsui, J. U. Espino, V. M. Dato, P. H. Gesteland, J. Hutman, and M. M. Wagner, "Technical description of RODS: A real-time public health surveillance system," J Am Med Inform Assoc, vol. 10, no. 5, pp. 399-408, Sept. 2003.
-
(2003)
J Am Med Inform Assoc
, vol.10
, Issue.5
, pp. 399-408
-
-
Tsui, F.-C.1
Espino, J.U.2
Dato, V.M.3
Gesteland, P.H.4
Hutman, J.5
Wagner, M.M.6
-
27
-
-
85081495666
-
Privacy preserving naïve bayes classifier for vertically partitioned data
-
J. Vaidya and C. Clifton, "Privacy preserving naïve bayes classifier for vertically partitioned data," in 2004 SIAM International Conference on Data Mining, Lake Buena Vista, Florida, Apr. 22-24 2004.
-
2004 SIAM International Conference on Data Mining, Lake Buena Vista, Florida, Apr. 22-24 2004
-
-
Vaidya, J.1
Clifton, C.2
-
28
-
-
0038208065
-
A bayesian decision model for cost optimal record matching
-
May
-
V. Verykios, G. Moustakides, and M. Elfeky, "A bayesian decision model for cost optimal record matching," The Very Large Data Bases Journal, vol. 12, no. 1, pp. 28-40, May 2003.
-
(2003)
The Very Large Data Bases Journal
, vol.12
, Issue.1
, pp. 28-40
-
-
Verykios, V.1
Moustakides, G.2
Elfeky, M.3
|