-
2
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
ACM
-
D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In PODS. ACM, 2001.
-
(2001)
PODS
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
3
-
-
0041783510
-
Privacy-preserving data, mining
-
W. Chen, J. F. Naughton, and P. A. Bernstein, editors, ACM
-
R. Agrawal and R. Srikant. Privacy-preserving data, mining. In W. Chen, J. F. Naughton, and P. A. Bernstein, editors, SIGMOD Conference, pages 439-450. ACM, 2000.
-
(2000)
SIGMOD Conference
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
29844443821
-
Privacy preserving OLAP
-
New York, NY, USA, ACM Press
-
R. Agrawal, R. Srikant, and D. Thomas. Privacy preserving OLAP. In SIGMOD '05: Proceedings of the 2005 ACM SIGMOD international conference on Management of data, pages 251-262, New York, NY, USA, 2005. ACM Press.
-
(2005)
SIGMOD '05: Proceedings of the 2005 ACM SIGMOD international conference on Management of data
, pp. 251-262
-
-
Agrawal, R.1
Srikant, R.2
Thomas, D.3
-
5
-
-
15044356955
-
Matrix rounding problems
-
M. Bacharach. Matrix rounding problems. Management Science, 9:732-742, 1966.
-
(1966)
Management Science
, vol.9
, pp. 732-742
-
-
Bacharach, M.1
-
6
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
C. Li, editor, ACM
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In C. Li, editor, PODS, pages 128-138. ACM, 2005.
-
(2005)
PODS
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
7
-
-
15044349954
-
Quadratic interior-point methods in statistical disclosure control
-
J. Castro. Quadratic interior-point methods in statistical disclosure control. Computational Management Science, 2:pages 107-121, 2005.
-
(2005)
Computational Management Science
, vol.2
, pp. 107-121
-
-
Castro, J.1
-
8
-
-
28044467158
-
Minimum-distance controlled perturbation methods for large-scale tabular data, protection
-
J. Castro. Minimum-distance controlled perturbation methods for large-scale tabular data, protection. Euorpean Journal of Operantional Research, 171:39-52, 2006.
-
(2006)
Euorpean Journal of Operantional Research
, vol.171
, pp. 39-52
-
-
Castro, J.1
-
9
-
-
24144487020
-
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In J. Kilian, editor, TCC, 3378 of Lecture Notes in Computer Science, pages 363-385. Springer, 2005.
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In J. Kilian, editor, TCC, volume 3378 of Lecture Notes in Computer Science, pages 363-385. Springer, 2005.
-
-
-
-
10
-
-
80053281091
-
On privacy-preserving histograms
-
Arlington, Virginia, AUAI Press
-
S. Chawla, C. Dwork, F. McSherry, and K. Talwar. On privacy-preserving histograms. In Proceedings of the 21th Annual Conference on Uncertainty in Artificial Intelligence (UAI-05), Arlington, Virginia, 2005. AUAI Press.
-
(2005)
Proceedings of the 21th Annual Conference on Uncertainty in Artificial Intelligence (UAI-05)
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Talwar, K.4
-
11
-
-
27344438927
-
Balancing quality and confidentiality in multivariate tabular data
-
L. Cox, J. Kelly, and R. Patil. Balancing quality and confidentiality in multivariate tabular data. Privacy in Statistical Databases, 3080:87-98, 2004.
-
(2004)
Privacy in Statistical Databases
, vol.3080
, pp. 87-98
-
-
Cox, L.1
Kelly, J.2
Patil, R.3
-
12
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
T. Dalenius. Towards a methodology for statistical disclosure control. Statistisk. tidskrift, 3:213-225, 1977.
-
(1977)
Statistisk. tidskrift
, vol.3
, pp. 213-225
-
-
Dalenius, T.1
-
14
-
-
35448978149
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In Milo [26], pages 202-210.
-
In Milo
, vol.26
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
17
-
-
27344459429
-
Confidentiality and statistical disclosure limitation
-
N. Smelser and P. Baltes, editors, Elsevier
-
G. Duncan. Confidentiality and statistical disclosure limitation. In N. Smelser and P. Baltes, editors, International Encyclopedia of the Social and Behavioral Sciences. Elsevier, 2001.
-
(2001)
International Encyclopedia of the Social and Behavioral Sciences
-
-
Duncan, G.1
-
18
-
-
33746335051
-
Differential privacy
-
M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, editors, ICALP 2, of, Springer
-
C. Dwork. Differential privacy. In M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, editors, ICALP (2), volume 4052 of Lecture Notes in Computer Science, pages 1-12. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
19
-
-
35448937070
-
-
C. Dwork, D. Lee, and F. McSherry. Privacy preserving histogram case study, 2007. Manuscript.
-
C. Dwork, D. Lee, and F. McSherry. Privacy preserving histogram case study, 2007. Manuscript.
-
-
-
-
20
-
-
33745556605
-
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In S. Halevi and T. Rabin, editors, TCC, 3876 of Lecture Notes in Computer Science, pages 265-284. Springer, 2006.
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In S. Halevi and T. Rabin, editors, TCC, volume 3876 of Lecture Notes in Computer Science, pages 265-284. Springer, 2006.
-
-
-
-
22
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
M. K. Franklin, editor, CRYPTO, of, Springer
-
C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In M. K. Franklin, editor, CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 528-544. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
23
-
-
1142263341
-
-
A. V. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data, mining. In Milo [26], pages 211-222.
-
A. V. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data, mining. In Milo [26], pages 211-222.
-
-
-
-
26
-
-
35448962717
-
-
T. Milo, editor, San Diego, CA, USA. ACM
-
T. Milo, editor. Proceedings of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 9-12, 2003, San Diego, CA, USA. ACM, 2003.
-
(2003)
Proceedings of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 9-12, 2003
-
-
-
27
-
-
0041750563
-
The controlled rounding problem: Relaxations and complexity issues
-
J. Kelly, A. Assad, and B. Golden. The controlled rounding problem: Relaxations and complexity issues. OR Spektrum, 12:129-138, 1990.
-
(1990)
OR Spektrum
, vol.12
, pp. 129-138
-
-
Kelly, J.1
Assad, A.2
Golden, B.3
-
28
-
-
84855542781
-
-
Cambridge University Press, Cambridge, UK
-
T. W. Körner. Fourier Analysis. Cambridge University Press, Cambridge, UK, 1988.
-
(1988)
Fourier Analysis
-
-
Körner, T.W.1
-
29
-
-
27844441837
-
All rational polytopes are transportation polytopes and all polytopal integer sets are contingency tables
-
Proceedings of the 10th Ann. Math. Prog. Soc. Symp. Integ. Prog. Combin. Optim
-
J. A. D. Loera and S. Onn. All rational polytopes are transportation polytopes and all polytopal integer sets are contingency tables. Proceedings of the 10th Ann. Math. Prog. Soc. Symp. Integ. Prog. Combin. Optim., LNCS, 3064:338-351, 2004.
-
(2004)
LNCS
, vol.3064
, pp. 338-351
-
-
Loera, J.A.D.1
Onn, S.2
-
30
-
-
4544288856
-
The complexity of three-way statistical tables
-
J. A. D. Loera and S. Onn. The complexity of three-way statistical tables. SIAM J. Comput., 33:819-836, 2004.
-
(2004)
SIAM J. Comput
, vol.33
, pp. 819-836
-
-
Loera, J.A.D.1
Onn, S.2
-
31
-
-
29744443981
-
Markov bases of three-way tables are arbitrarily complicated
-
J. A. D. Loera and S. Onn. Markov bases of three-way tables are arbitrarily complicated. J. Symb. Comput., 41(2):173-181, 2006.
-
(2006)
J. Symb. Comput
, vol.41
, Issue.2
, pp. 173-181
-
-
Loera, J.A.D.1
Onn, S.2
-
32
-
-
33749607006
-
l-diversity: Privacy beyond k-anonymity
-
L. Liu, A. Reuter, K.-Y. Whang, and J. Zhang, editors, IEEE Computer Society
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In L. Liu, A. Reuter, K.-Y. Whang, and J. Zhang, editors, ICDE, page 24. IEEE Computer Society, 2006.
-
(2006)
ICDE
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
33
-
-
84949440059
-
Cell suppression: Experience and theory
-
J. Domingo-Ferrer, editor, Inference Control in Statistical Databases, of, Springer
-
D. A. Robertson and R. Ethier. Cell suppression: Experience and theory. In J. Domingo-Ferrer, editor, Inference Control in Statistical Databases, volume 2316 of Lecture Notes in Computer Science, pages 8-20. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2316
, pp. 8-20
-
-
Robertson, D.A.1
Ethier, R.2
-
34
-
-
0012776989
-
Discussion: Statistical disclosure limitation
-
D. Rubin. Discussion: Statistical disclosure limitation. Journal of Official Statistics, 9:461-469, 1993.
-
(1993)
Journal of Official Statistics
, vol.9
, pp. 461-469
-
-
Rubin, D.1
-
35
-
-
35448957489
-
-
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
-
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression.
-
-
-
|