-
1
-
-
35048841248
-
-
Aggarwal, C.C., Yu, P.S.: A condensation approach to privacy preserving data mining. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, 2992, pp. 183-199. Springer, Heidelberg (2004)
-
Aggarwal, C.C., Yu, P.S.: A condensation approach to privacy preserving data mining. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 183-199. Springer, Heidelberg (2004)
-
-
-
-
2
-
-
26944445962
-
A.: K-Anonymity: Algorithms and hardness
-
Technical report, Stanford University
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: k-Anonymity: Algorithms and hardness. Technical report, Stanford University (2004)
-
(2004)
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu7
-
3
-
-
33846678309
-
Enabling the 21st century health care information technology revolution
-
Agrawal, R., Grandison, T., Johnson, C., Kiernan, J.: Enabling the 21st century health care information technology revolution. Communications of the ACM 50(2), 35-42 (2007)
-
(2007)
Communications of the ACM
, vol.50
, Issue.2
, pp. 35-42
-
-
Agrawal, R.1
Grandison, T.2
Johnson, C.3
Kiernan, J.4
-
4
-
-
0242674432
-
Hippocratic databases
-
Hong Kong
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th International Conference on Very Large Databases, Hong Kong (2002)
-
(2002)
Proceedings of the 28th International Conference on Very Large Databases
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
5
-
-
0041783510
-
Privacy preserving data mining
-
ACM Press, New York
-
Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proceedings of the ACM SIGMOD, pp. 439-450. ACM Press, New York (2000)
-
(2000)
Proceedings of the ACM SIGMOD
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
6
-
-
77958470354
-
-
Aguilar, C., Deswarte, Y.: Single database private information retrieval schemes. In: Domingo-Ferrer, J., Franconi, L. (eds.) PSD 2006. LNCS, 4302, pp. 257-265. Springer, Heidelberg (2006)
-
Aguilar, C., Deswarte, Y.: Single database private information retrieval schemes. In: Domingo-Ferrer, J., Franconi, L. (eds.) PSD 2006. LNCS, vol. 4302, pp. 257-265. Springer, Heidelberg (2006)
-
-
-
-
8
-
-
0029541045
-
Private information retrieval
-
IEEE Computer Society Press, Los Alamitos
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: IEEE Symposium on Foundations of Computer Science (FOCS), pp. 41-50. IEEE Computer Society Press, Los Alamitos (1995)
-
(1995)
IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
9
-
-
0000072558
-
Finding a needle in a haystack - or identifying anonymous census records
-
Dalenius, T.: Finding a needle in a haystack - or identifying anonymous census records. Journal of Official Statistics 2(3), 329-336 (1986)
-
(1986)
Journal of Official Statistics
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
11
-
-
35048834229
-
-
Domingo-Ferrer, J., Sebe, F., Castellà, J.: On the security of noise addition for privacy in statistical databases. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, 3050, pp. 149-161. Springer, Heidelberg (2004)
-
Domingo-Ferrer, J., Sebe, F., Castellà, J.: On the security of noise addition for privacy in statistical databases. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 149-161. Springer, Heidelberg (2004)
-
-
-
-
12
-
-
26944448516
-
Ordinal, continuous and heterogenerous k-anonymity through microaggregation
-
Domingo-Ferrer, J., Torra, V.: Ordinal, continuous and heterogenerous k-anonymity through microaggregation. Data Mining and Knowledge Discovery 11(2), 195-212 (2005)
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
13
-
-
77952334884
-
Using randomized response techniques for privacy-preserving data mining
-
Washington, D.C, pp
-
Du, W., Zhan, Z.: Using randomized response techniques for privacy-preserving data mining. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, D.C, pp. 505-510 (2003)
-
(2003)
Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 505-510
-
-
Du, W.1
Zhan, Z.2
-
14
-
-
2242464139
-
Optimal disclosure limitation strategy in statistical databases: Deterring tracker attacks through additive noise
-
Duncan, G.T., Mukherjee, S.: Optimal disclosure limitation strategy in statistical databases: deterring tracker attacks through additive noise. Journal of the American Statistical Association 95, 720-729 (2000)
-
(2000)
Journal of the American Statistical Association
, vol.95
, pp. 720-729
-
-
Duncan, G.T.1
Mukherjee, S.2
-
16
-
-
0036563104
-
Confidentiality via camouflage: The cvc approach to disclosure limitation when answering queries to databases
-
Gopal, R., Garfinkel, R., Goes, P.: Confidentiality via camouflage: the cvc approach to disclosure limitation when answering queries to databases. Operations Research 50, 501-516 (2002)
-
(2002)
Operations Research
, vol.50
, pp. 501-516
-
-
Gopal, R.1
Garfinkel, R.2
Goes, P.3
-
17
-
-
38049011449
-
-
Hundepool, A, Domingo-Ferrer, J, Franconi, L, Giessing, S, Lenz, R, Longhurst, J, Schulte-Nordholt, E, Seri, G, DeWolf, P.-R: Handbook on Statistical Disclosure Control (version 1.0, In: Eurostat CENEX SDC Project Deliverable, 2006
-
Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Lenz, R., Longhurst, J., Schulte-Nordholt, E., Seri, G., DeWolf, P.-R: Handbook on Statistical Disclosure Control (version 1.0). In: Eurostat (CENEX SDC Project Deliverable) (2006)
-
-
-
-
18
-
-
84974555530
-
Privacy preserving data mining
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36-53. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 36-53
-
-
Lindell, Y.1
Pinkas, B.2
-
19
-
-
33746437508
-
Privacy preserving data mining
-
Lindell, Y., Pinkas, B.: Privacy preserving data mining. Journal of Cryptology 15(3), 177-206 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
20
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P.: Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010-1027 (2001)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
21
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Technical report, SRI International
-
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI International (1998)
-
(1998)
-
-
Samarati, P.1
Sweeney, L.2
-
22
-
-
0019149034
-
Disclosure from statistical databases: Quantitative aspects of trackers
-
Schlörer, J.: Disclosure from statistical databases: quantitative aspects of trackers. ACM Transactions on Database Systems 5, 467-492 (1980)
-
(1980)
ACM Transactions on Database Systems
, vol.5
, pp. 467-492
-
-
Schlörer, J.1
-
24
-
-
34548771295
-
Privacy protection: P-sensitive k-anonymity property
-
IEEE Computer Society Press, Los Alamitos
-
Truta, T.M., Vinay, B.: Privacy protection: p-sensitive k-anonymity property. In: 2nd International Workshop on Privacy Data Management PDM 2006, p. 94. IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
2nd International Workshop on Privacy Data Management
, vol.PDM 2006
, pp. 94
-
-
Truta, T.M.1
Vinay, B.2
-
25
-
-
2142754478
-
Association rule hiding
-
Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. IEEE Transactions on Knowledge and Data Engineering 16(4), 434-447 (2004)
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
|