-
1
-
-
33745629638
-
-
C. Aggarwal, On k-anonymity and the curse of dimensionality, in: Proceedings of the 31st International Conference on Very Large Data Bases (VLDB), 2005.
-
C. Aggarwal, On k-anonymity and the curse of dimensionality, in: Proceedings of the 31st International Conference on Very Large Data Bases (VLDB), 2005.
-
-
-
-
2
-
-
39749115228
-
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, A. Zhu, Anonymizing tables, in: Proceedings of International Conference on Database Theory (ICDT), 2005.
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, A. Zhu, Anonymizing tables, in: Proceedings of International Conference on Database Theory (ICDT), 2005.
-
-
-
-
3
-
-
34250661905
-
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, A. Zhu, Achieving anonymity via clustering, in: Proceedings of the 25th ACM Symposium on Principles of Database Systems (PODS), 2006.
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, A. Zhu, Achieving anonymity via clustering, in: Proceedings of the 25th ACM Symposium on Principles of Database Systems (PODS), 2006.
-
-
-
-
4
-
-
28444449426
-
-
R. J. Bayardo, R. Agrawal, Data privacy through optimal k-anonymization, in: Proceedings of the 21st International Conference on Data Engineering (ICDE), 2005.
-
R. J. Bayardo, R. Agrawal, Data privacy through optimal k-anonymization, in: Proceedings of the 21st International Conference on Data Engineering (ICDE), 2005.
-
-
-
-
5
-
-
39749103172
-
-
J. Domingo-Ferrer, V. Torra, Disclosure protection methods and information loss for microdata, in: Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, 2001, pp. 91-110.
-
J. Domingo-Ferrer, V. Torra, Disclosure protection methods and information loss for microdata, in: Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, 2001, pp. 91-110.
-
-
-
-
6
-
-
26944448516
-
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
-
Domingo-Ferrer J., and Torra V. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining and Knowledge Discovery 11 2 (2005) 195-212
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
7
-
-
28444499680
-
-
B.C.M. Fung, K. Wang, P.S. Yu, Top-down specialization for information and privacy preservation, in: Proceedings of the 21st International Conference on Data Engineering (ICDE), 2005.
-
B.C.M. Fung, K. Wang, P.S. Yu, Top-down specialization for information and privacy preservation, in: Proceedings of the 21st International Conference on Data Engineering (ICDE), 2005.
-
-
-
-
8
-
-
0242625276
-
-
V. S. Iyengar, Transforming data to satisfy privacy constraints, in: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2002.
-
V. S. Iyengar, Transforming data to satisfy privacy constraints, in: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2002.
-
-
-
-
9
-
-
29844444250
-
-
K. LeFevre, D. DeWitt, R. Ramakrishnan, Incognito: efficient full-domain k-anonymity, in: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), 2005.
-
K. LeFevre, D. DeWitt, R. Ramakrishnan, Incognito: efficient full-domain k-anonymity, in: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), 2005.
-
-
-
-
10
-
-
33749606641
-
-
K. LeFevre, D. DeWitt, R. Ramakrishnan, Mondrian multidimensional k-anonymity, in: Proceedings of the 22nd International Conference on Data Engineering (ICDE), 2006.
-
K. LeFevre, D. DeWitt, R. Ramakrishnan, Mondrian multidimensional k-anonymity, in: Proceedings of the 22nd International Conference on Data Engineering (ICDE), 2006.
-
-
-
-
11
-
-
34548805858
-
-
N. Li, T. Li, S. Venkatasubramanian, t-closeness: privacy beyond k-anonymity and ℓ-diversity, in: Proceedings of the 23rd International Conference on Data Engineering (ICDE), 2007.
-
N. Li, T. Li, S. Venkatasubramanian, t-closeness: privacy beyond k-anonymity and ℓ-diversity, in: Proceedings of the 23rd International Conference on Data Engineering (ICDE), 2007.
-
-
-
-
12
-
-
33749607006
-
-
A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, ℓ-diversity: privacy beyond k-anonymity, in: Proceedings of the 22nd International Conference on Data Engineering (ICDE), 2006.
-
A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, ℓ-diversity: privacy beyond k-anonymity, in: Proceedings of the 22nd International Conference on Data Engineering (ICDE), 2006.
-
-
-
-
13
-
-
3142691086
-
-
A. Meyerson, R. Williams, On the complexity of optimal k-anonymity, in: Proceedings of the 23rd ACM Symposium on Principles of Database Systems (PODS), 2004.
-
A. Meyerson, R. Williams, On the complexity of optimal k-anonymity, in: Proceedings of the 23rd ACM Symposium on Principles of Database Systems (PODS), 2004.
-
-
-
-
14
-
-
0000819568
-
The number of partitions of a set
-
Rota G.C. The number of partitions of a set. American Mathematical Monthly 71 5 (1964) 498-504
-
(1964)
American Mathematical Monthly
, vol.71
, Issue.5
, pp. 498-504
-
-
Rota, G.C.1
-
15
-
-
39749112807
-
-
R. Rymon, Search through systematic set enumeration, in: Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR-02), 1992.
-
R. Rymon, Search through systematic set enumeration, in: Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR-02), 1992.
-
-
-
-
17
-
-
39749123508
-
-
P. Samarati, L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory, 1998.
-
P. Samarati, L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory, 1998.
-
-
-
-
20
-
-
19544380211
-
-
K. Wang, P.S. Yu, S. Chakraborty, Bottom-up generalization: a data mining solution to privacy protection, in: Proceedings of the 4th International Conference on Data Mining (ICDM), 2004.
-
K. Wang, P.S. Yu, S. Chakraborty, Bottom-up generalization: a data mining solution to privacy protection, in: Proceedings of the 4th International Conference on Data Mining (ICDM), 2004.
-
-
-
-
21
-
-
0000835392
-
Opus: an efficient admissible algorithm for unordered search
-
Webb G.I. Opus: an efficient admissible algorithm for unordered search. Journal of Artificial Intelligence Research (1995) 431-465
-
(1995)
Journal of Artificial Intelligence Research
, pp. 431-465
-
-
Webb, G.I.1
|