메뉴 건너뛰기




Volumn , Issue , 2007, Pages 273-282

Privacy, accuracy, and consistency too: A holistic solution to contingency table release

Author keywords

Contingency table release; OLAP; Privacy

Indexed keywords

CONTINGENCY TABLE RELEASE; PRIVACY GUARANTEES;

EID: 35448955720     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1265530.1265569     Document Type: Conference Paper
Times cited : (408)

References (37)
  • 2
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • ACM
    • D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In PODS. ACM, 2001.
    • (2001) PODS
    • Agrawal, D.1    Aggarwal, C.C.2
  • 3
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data, mining
    • W. Chen, J. F. Naughton, and P. A. Bernstein, editors, ACM
    • R. Agrawal and R. Srikant. Privacy-preserving data, mining. In W. Chen, J. F. Naughton, and P. A. Bernstein, editors, SIGMOD Conference, pages 439-450. ACM, 2000.
    • (2000) SIGMOD Conference , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 5
    • 15044356955 scopus 로고
    • Matrix rounding problems
    • M. Bacharach. Matrix rounding problems. Management Science, 9:732-742, 1966.
    • (1966) Management Science , vol.9 , pp. 732-742
    • Bacharach, M.1
  • 6
    • 33244468835 scopus 로고    scopus 로고
    • Practical privacy: The SuLQ framework
    • C. Li, editor, ACM
    • A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In C. Li, editor, PODS, pages 128-138. ACM, 2005.
    • (2005) PODS , pp. 128-138
    • Blum, A.1    Dwork, C.2    McSherry, F.3    Nissim, K.4
  • 7
    • 15044349954 scopus 로고    scopus 로고
    • Quadratic interior-point methods in statistical disclosure control
    • J. Castro. Quadratic interior-point methods in statistical disclosure control. Computational Management Science, 2:pages 107-121, 2005.
    • (2005) Computational Management Science , vol.2 , pp. 107-121
    • Castro, J.1
  • 8
    • 28044467158 scopus 로고    scopus 로고
    • Minimum-distance controlled perturbation methods for large-scale tabular data, protection
    • J. Castro. Minimum-distance controlled perturbation methods for large-scale tabular data, protection. Euorpean Journal of Operantional Research, 171:39-52, 2006.
    • (2006) Euorpean Journal of Operantional Research , vol.171 , pp. 39-52
    • Castro, J.1
  • 9
    • 24144487020 scopus 로고    scopus 로고
    • S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In J. Kilian, editor, TCC, 3378 of Lecture Notes in Computer Science, pages 363-385. Springer, 2005.
    • S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In J. Kilian, editor, TCC, volume 3378 of Lecture Notes in Computer Science, pages 363-385. Springer, 2005.
  • 11
    • 27344438927 scopus 로고    scopus 로고
    • Balancing quality and confidentiality in multivariate tabular data
    • L. Cox, J. Kelly, and R. Patil. Balancing quality and confidentiality in multivariate tabular data. Privacy in Statistical Databases, 3080:87-98, 2004.
    • (2004) Privacy in Statistical Databases , vol.3080 , pp. 87-98
    • Cox, L.1    Kelly, J.2    Patil, R.3
  • 12
    • 0012793677 scopus 로고
    • Towards a methodology for statistical disclosure control
    • T. Dalenius. Towards a methodology for statistical disclosure control. Statistisk. tidskrift, 3:213-225, 1977.
    • (1977) Statistisk. tidskrift , vol.3 , pp. 213-225
    • Dalenius, T.1
  • 14
    • 35448978149 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • I. Dinur and K. Nissim. Revealing information while preserving privacy. In Milo [26], pages 202-210.
    • In Milo , vol.26 , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 17
    • 27344459429 scopus 로고    scopus 로고
    • Confidentiality and statistical disclosure limitation
    • N. Smelser and P. Baltes, editors, Elsevier
    • G. Duncan. Confidentiality and statistical disclosure limitation. In N. Smelser and P. Baltes, editors, International Encyclopedia of the Social and Behavioral Sciences. Elsevier, 2001.
    • (2001) International Encyclopedia of the Social and Behavioral Sciences
    • Duncan, G.1
  • 18
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, editors, ICALP 2, of, Springer
    • C. Dwork. Differential privacy. In M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, editors, ICALP (2), volume 4052 of Lecture Notes in Computer Science, pages 1-12. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 19
    • 35448937070 scopus 로고    scopus 로고
    • C. Dwork, D. Lee, and F. McSherry. Privacy preserving histogram case study, 2007. Manuscript.
    • C. Dwork, D. Lee, and F. McSherry. Privacy preserving histogram case study, 2007. Manuscript.
  • 20
    • 33745556605 scopus 로고    scopus 로고
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In S. Halevi and T. Rabin, editors, TCC, 3876 of Lecture Notes in Computer Science, pages 265-284. Springer, 2006.
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In S. Halevi and T. Rabin, editors, TCC, volume 3876 of Lecture Notes in Computer Science, pages 265-284. Springer, 2006.
  • 22
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving datamining on vertically partitioned databases
    • M. K. Franklin, editor, CRYPTO, of, Springer
    • C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In M. K. Franklin, editor, CRYPTO, volume 3152 of Lecture Notes in Computer Science, pages 528-544. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 23
    • 1142263341 scopus 로고    scopus 로고
    • A. V. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data, mining. In Milo [26], pages 211-222.
    • A. V. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data, mining. In Milo [26], pages 211-222.
  • 27
    • 0041750563 scopus 로고
    • The controlled rounding problem: Relaxations and complexity issues
    • J. Kelly, A. Assad, and B. Golden. The controlled rounding problem: Relaxations and complexity issues. OR Spektrum, 12:129-138, 1990.
    • (1990) OR Spektrum , vol.12 , pp. 129-138
    • Kelly, J.1    Assad, A.2    Golden, B.3
  • 28
    • 84855542781 scopus 로고
    • Cambridge University Press, Cambridge, UK
    • T. W. Körner. Fourier Analysis. Cambridge University Press, Cambridge, UK, 1988.
    • (1988) Fourier Analysis
    • Körner, T.W.1
  • 29
    • 27844441837 scopus 로고    scopus 로고
    • All rational polytopes are transportation polytopes and all polytopal integer sets are contingency tables
    • Proceedings of the 10th Ann. Math. Prog. Soc. Symp. Integ. Prog. Combin. Optim
    • J. A. D. Loera and S. Onn. All rational polytopes are transportation polytopes and all polytopal integer sets are contingency tables. Proceedings of the 10th Ann. Math. Prog. Soc. Symp. Integ. Prog. Combin. Optim., LNCS, 3064:338-351, 2004.
    • (2004) LNCS , vol.3064 , pp. 338-351
    • Loera, J.A.D.1    Onn, S.2
  • 30
    • 4544288856 scopus 로고    scopus 로고
    • The complexity of three-way statistical tables
    • J. A. D. Loera and S. Onn. The complexity of three-way statistical tables. SIAM J. Comput., 33:819-836, 2004.
    • (2004) SIAM J. Comput , vol.33 , pp. 819-836
    • Loera, J.A.D.1    Onn, S.2
  • 31
    • 29744443981 scopus 로고    scopus 로고
    • Markov bases of three-way tables are arbitrarily complicated
    • J. A. D. Loera and S. Onn. Markov bases of three-way tables are arbitrarily complicated. J. Symb. Comput., 41(2):173-181, 2006.
    • (2006) J. Symb. Comput , vol.41 , Issue.2 , pp. 173-181
    • Loera, J.A.D.1    Onn, S.2
  • 32
    • 33749607006 scopus 로고    scopus 로고
    • l-diversity: Privacy beyond k-anonymity
    • L. Liu, A. Reuter, K.-Y. Whang, and J. Zhang, editors, IEEE Computer Society
    • A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In L. Liu, A. Reuter, K.-Y. Whang, and J. Zhang, editors, ICDE, page 24. IEEE Computer Society, 2006.
    • (2006) ICDE , pp. 24
    • Machanavajjhala, A.1    Gehrke, J.2    Kifer, D.3    Venkitasubramaniam, M.4
  • 33
    • 84949440059 scopus 로고    scopus 로고
    • Cell suppression: Experience and theory
    • J. Domingo-Ferrer, editor, Inference Control in Statistical Databases, of, Springer
    • D. A. Robertson and R. Ethier. Cell suppression: Experience and theory. In J. Domingo-Ferrer, editor, Inference Control in Statistical Databases, volume 2316 of Lecture Notes in Computer Science, pages 8-20. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2316 , pp. 8-20
    • Robertson, D.A.1    Ethier, R.2
  • 34
    • 0012776989 scopus 로고
    • Discussion: Statistical disclosure limitation
    • D. Rubin. Discussion: Statistical disclosure limitation. Journal of Official Statistics, 9:461-469, 1993.
    • (1993) Journal of Official Statistics , vol.9 , pp. 461-469
    • Rubin, D.1
  • 35
    • 35448957489 scopus 로고    scopus 로고
    • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
    • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.