-
1
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
Istanbul, Turkey
-
Li N, Li T, Venkatasubramanian S. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proc. ICDE, Istanbul, Turkey, 2007, pp.106-115.
-
(2007)
Proc. ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
2
-
-
38149078956
-
Speeding up clustering-based k-anonymisation algorithms with pre-partitioning
-
Glasgow, UK
-
Loukides G, Shao J. Speeding up clustering-based k-anonymisation algorithms with pre-partitioning. In Proc. The 24th British National Conference on Databases, Glasgow, UK, 2007, pp.203-214.
-
(2007)
Proc. the 24th British National Conference on Databases
, pp. 203-214
-
-
Loukides, G.1
Shao, J.2
-
6
-
-
33749606641
-
Mondrian multi-dimensional K-anonymity
-
Atlanta, Georgia, USA
-
LeFevre K, DeWitt D J, Ramakrishnan R. Mondrian multi-dimensional K-anonymity. In Proc. ICDE, Atlanta, Georgia, USA, 2006, p.25.
-
(2006)
Proc. ICDE
, pp. 25
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
7
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
Tokyo, Japan
-
Bayardo R J, Agrawal R. Data privacy through optimal k-anonymization. In Proc. ICDE, Tokyo, Japan, 2005, pp.217-228.
-
(2005)
Proc. ICDE
, pp. 217-228
-
-
Bayardo, R.J.1
Agrawal, R.2
-
8
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Edmonton, Alberta, Canada
-
Iyengar V S. Transforming data to satisfy privacy constraints. In Proc. KDD, Edmonton, Alberta, Canada, 2002, pp.279-288.
-
(2002)
Proc. KDD
, pp. 279-288
-
-
Iyengar, V.S.1
-
9
-
-
33749568323
-
Workload-aware anonymization
-
Philadelphia, PA, USA
-
LeFevre K, DeWitt D J, Ramakrishnan R. Workload-aware anonymization. In Proc. KDD, Philadelphia, PA, USA, 2006, pp.277-286.
-
(2006)
Proc. KDD
, pp. 277-286
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
10
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Tokyo, Japan
-
Fung B C M, Wang K, Yu P S. Top-down specialization for information and privacy preservation. In Proc. ICDE, Tokyo, Japan, 2005, pp.205-216.
-
(2005)
Proc. ICDE
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
11
-
-
42149134082
-
Comparisons of k-anonymization and randomization schemes under linking attacks
-
Hong Kong, China
-
Teng Z, Du W. Comparisons of k-anonymization and randomization schemes under linking attacks. In Proc. ICDM, Hong Kong, China, 2006, pp.1091-1096.
-
(2006)
Proc. ICDM
, pp. 1091-1096
-
-
Teng, Z.1
Du, W.2
-
12
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
Atlanta, Georgia, USA
-
Machanavajjhala A Gehrke J, D Kifer et al. l-diversity: Privacy beyond k-anonymity. In Proc. ICDE, Atlanta, Georgia, USA, 2006, p.24.
-
(2006)
Proc. ICDE
, pp. 24
-
-
MacHanavajjhala Gehrke A, J.1
Kifer Et Al., D.2
-
13
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
Istanbul, Turkey
-
Koudas N, Zhang Q, Srivastava D et al. Aggregate query answering on anonymized tables. In Proc. ICDE, Istanbul, Turkey, 2007, pp.116-125.
-
(2007)
Proc. ICDE
, pp. 116-125
-
-
Koudas, N.1
Zhang, Q.2
Srivastava, D.3
-
15
-
-
29844444250
-
Incognito: Efficient full-domain K-anonymity
-
Baltimore, Maryland, USA
-
LeFevre K, DeWitt D J, Ramakrishnan R. Incognito: Efficient full-domain K-anonymity. In Proc. SIGMOD, Baltimore, Maryland, USA, 2005, pp.49-60.
-
(2005)
Proc. SIGMOD
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
16
-
-
33749582207
-
Utility-based anonymization using local recoding
-
Philadelphia, PA, USA
-
Xu J, Wang W, Pei J et al. Utility-based anonymization using local recoding. In Proc. KDD, Philadelphia, PA, USA, 2006, pp.785-790.
-
(2006)
Proc. KDD
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
-
17
-
-
35048841248
-
A condensation approach to privacy preserving data mining
-
Heraklion, Crete, Greece
-
Aggarwal C C, Yu P S. A condensation approach to privacy preserving data mining. In Proc. The 9th International Conference on Extending Database Technology, Heraklion, Crete, Greece, 2004, pp.183-199.
-
(2004)
Proc. the 9th International Conference on Extending Database Technology
, pp. 183-199
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
18
-
-
38049126170
-
Efficient k-anonymization using clustering techniques
-
Bangkok, Thailand
-
Byun J, Kamra E, Bertino E et al. Efficient k-anonymization using clustering techniques. In Proc. The 12th International Conference on Database Systems for Advanced Applications, 2007, Bangkok, Thailand, pp.188-200.
-
(2007)
Proc. the 12th International Conference on Database Systems for Advanced Applications
, pp. 188-200
-
-
Byun, J.1
Kamra, E.2
Bertino, E.3
-
19
-
-
85012191696
-
Data bubbles for non-vector data: Speeding-up hierarchical clustering in arbitrary metric spaces
-
Berlin, Germany
-
Zhou J, Sander J. Data bubbles for non-vector data: Speeding-up hierarchical clustering in arbitrary metric spaces. In Proc. VLDB, Berlin, Germany, 2003, pp.452-463.
-
(2003)
Proc. VLDB
, pp. 452-463
-
-
Zhou, J.1
Sander, J.2
-
21
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
Seoul, Korea
-
Xiao X, Tao Y. Anatomy: Simple and effective privacy preservation. In Proc. VLDB, Seoul, Korea, 2006, pp.139-150.
-
(2006)
Proc. VLDB
, pp. 139-150
-
-
Xiao, X.1
Tao, Y.2
-
22
-
-
0000566535
-
RainForest - A Framework for fast decision tree construction of large datasets
-
New York City, USA
-
Gehrke J, Ramakrishnan R, Ganti V. RainForest - A Framework for fast decision tree construction of large datasets. In Proc. VLDB, New York City, USA, 1998, pp.416-427.
-
(1998)
Proc. VLDB
, pp. 416-427
-
-
Gehrke, J.1
Ramakrishnan, R.2
Ganti, V.3
|