-
1
-
-
0242674432
-
Hippocratic databases
-
Hong Kong, Morgan Kauffman
-
th Int'l Conference on Very Large Database (VLDB), Hong Kong, Morgan Kauffman, 2002, pp. 143-154.
-
(2002)
th Int'l Conference on Very Large Database (VLDB)
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
0003219646
-
Goal/Question/Metric Paradigm
-
Marciniak J.J, editor, John Wiley & Sons
-
V.R. Basili, G. Caldiera, and H.D. Rombach, "Goal/Question/Metric Paradigm." In Marciniak J.J., editor, Encyclopedia of Software Engineering, vol. 1, pp. 528-532. John Wiley & Sons, 1994.
-
(1994)
Encyclopedia of Software Engineering
, vol.1
, pp. 528-532
-
-
Basili, V.R.1
Caldiera, G.2
Rombach, H.D.3
-
3
-
-
0141717704
-
Technology Solutions for Protecting Privacy
-
R.J. Bayardo, and R. Srikant, "Technology Solutions for Protecting Privacy", Computer, Septemebr 2003, IEEE CS, pp. 115-119.
-
Computer, Septemebr 2003, IEEE CS
, pp. 115-119
-
-
Bayardo, R.J.1
Srikant, R.2
-
4
-
-
28444478342
-
Privacy and ownership preserving of Outsourced Medical Data
-
Tokyo, Japan, IEEE CS, pp
-
st Int'l Conference on Data Engineering (ICDE '05), Tokyo, Japan, 2005, IEEE CS, pp. 521-532
-
(2005)
st Int'l Conference on Data Engineering (ICDE '05)
, pp. 521-532
-
-
Bertmo, E.1
Ooi, B.C.2
Yang, Y.3
Deng, R.H.4
-
5
-
-
28444499680
-
Top-Down Specialization for information and Privacy Preservation
-
Tokyo, Japan, IEEE CS, pp
-
C.M. Fung, K. Wang, and S.P. Yu, "Top-Down Specialization for information and Privacy Preservation" proc. of 21st International Conference on Data Engineering (ICDE'05), Tokyo, Japan, 2005, IEEE CS, pp. 205-216.
-
(2005)
proc. of 21st International Conference on Data Engineering (ICDE'05)
, pp. 205-216
-
-
Fung, C.M.1
Wang, K.2
Yu, S.P.3
-
6
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Edmonton, AB, Canada, July, ACM, pp
-
th ACM SIGKDD Int'l Conference on Knowledge Discovery and Data Mining, Edmonton, AB, Canada, July 2002, ACM, pp. 279-288.
-
(2002)
th ACM SIGKDD Int'l Conference on Knowledge Discovery and Data Mining
, pp. 279-288
-
-
Iyengar, V.S.1
-
7
-
-
33749607006
-
1-Diversity: Privacy Beyond k-Anonymity
-
Atalanta, Georgia, USA, March, IEEE CS, pp
-
nd Int'l Conference on Data Engineering (ICDE '06), Atalanta, Georgia, USA, March 2006, IEEE CS, pp. 24.
-
(2006)
nd Int'l Conference on Data Engineering (ICDE '06)
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
-
8
-
-
3142752802
-
The role of Cryptography in Database Security
-
Paris, France, ACM, pp
-
U. Maurer, "The role of Cryptography in Database Security", proc. of SIGMOD int'l conference on Management of Data, Paris, France 2004, ACM, pp. 5-10.
-
(2004)
proc. of SIGMOD int'l conference on Management of Data
, pp. 5-10
-
-
Maurer, U.1
-
9
-
-
33748527035
-
Personal privacy in ubiquitous computing-Tools and System Support
-
PhD. Dissertation, ETH Zurich, Switzerland, May
-
M. Langheinrich, "Personal privacy in ubiquitous computing-Tools and System Support", PhD. Dissertation, ETH Zurich, Switzerland, May 2005.
-
(2005)
-
-
Langheinrich, M.1
-
12
-
-
33748532138
-
Personalization in Privacy-Aware Highly dynamic Systems
-
Sept
-
S. Sackman, J. Struker, and R. Accorsi, "Personalization in Privacy-Aware Highly dynamic Systems", Communications of the ACM, Vol. 49 No. 9, Sept 2006, pp. 33-38.
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 33-38
-
-
Sackman, S.1
Struker, J.2
Accorsi, R.3
-
13
-
-
0036811662
-
k-Anonymity: A model for Protecting Privacy
-
L. Sweeney, "k-Anonymity: A model for Protecting Privacy", International Journal on Uncertainty, Fuzziness and Knowledge Based Systems, 10, pp. 557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge Based Systems
, vol.10
, pp. 557-570
-
-
Sweeney, L.1
-
14
-
-
0242698173
-
Datafly: A System for Providing Anonymity in Medical Data
-
Chapman & Hall, Ltd, pp
-
L. Sweeney, "Datafly: A System for Providing Anonymity in Medical Data", proc. of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects, 1997, Chapman & Hall, Ltd., pp: 356-381.
-
(1997)
proc. of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
, pp. 356-381
-
-
Sweeney, L.1
-
15
-
-
33748524821
-
Legal Programming
-
ACM, pp
-
B. Subirana, and M. Bain, "Legal Programming", Communications of the ACM, Vol. 49 No. 9, 2006, ACM, pp. 57-62.
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 57-62
-
-
Subirana, B.1
Bain, M.2
-
16
-
-
19544380211
-
-
K. Wang, P.S: Yu, and S. Chakraborty, Bottom-up Generalization: A Data Mining Solution to privacy Proctection, proc. Of the Fourth IEEE Int'l Conference on Data Mining (ICDM'04), Brighton, UK; 2004, IEEE CS, pp. 249-256.
-
K. Wang, P.S: Yu, and S. Chakraborty, "Bottom-up Generalization: A Data Mining Solution to privacy Proctection", proc. Of the Fourth IEEE Int'l Conference on Data Mining (ICDM'04), Brighton, UK; 2004, IEEE CS, pp. 249-256.
-
-
-
-
17
-
-
47949110813
-
-
Platform for Privacy Preferences (P3P) Project, W3C, http://www.w3.org/ P3P/ (last access on January 2007).
-
Platform for Privacy Preferences (P3P) Project, W3C, http://www.w3.org/ P3P/ (last access on January 2007).
-
-
-
|