-
1
-
-
33745629638
-
On k-anonymity and the curse of dimensionality
-
C. C. Aggarwal. On k-anonymity and the curse of dimensionality. In VLDB, 2005.
-
(2005)
VLDB
-
-
Aggarwal, C.C.1
-
2
-
-
29844432932
-
A condensation based approach to privacy preserving data mining
-
C. C. Aggarwal and P. S. Yu. A condensation based approach to privacy preserving data mining. In EDBT, 2004.
-
(2004)
EDBT
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
3
-
-
34250661905
-
Achieving anonymity via clustering
-
G. Aggarwal, T. Feder. K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. 25th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems., 2006.
-
(2006)
25th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
E. Bertino, B. Qoi, Y. Yang, and R. Deng. Privacy and ownership preserving of outsourced medical data. In ICDE, 2005.
-
(2005)
ICDE
-
-
Bertino, E.1
Qoi, B.2
Yang, Y.3
Deng, R.4
-
5
-
-
0003810593
-
The idea of de-clustering and its applications
-
M. T. Fang, C. T. Rechard, and C. C. Chang. The idea of de-clustering and its applications. In VLDB, 1986.
-
(1986)
VLDB
-
-
Fang, M.T.1
Rechard, C.T.2
Chang, C.C.3
-
6
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In ICDE, 2005.
-
(2005)
ICDE
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
7
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. Iyengar. Transforming data to satisfy privacy constraints. In SIGKDD, 2002.
-
(2002)
SIGKDD
-
-
Iyengar, V.1
-
8
-
-
28444449426
-
-
R. J. B. Jr. and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
-
R. J. B. Jr. and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
-
-
-
-
9
-
-
34250673244
-
Injecting utility into anonymized datasets
-
D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In SIGMOD, 2006.
-
(2006)
SIGMOD
-
-
Kifer, D.1
Gehrke, J.2
-
13
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In PODS, 2004.
-
(2004)
PODS
-
-
Meyerson, A.1
Williams, R.2
-
14
-
-
33746103944
-
Anonymity, unobservability, psuedonymitym. and identify management
-
A. Pfitamann and M. Hansen. Anonymity, unobservability, psuedonymitym. and identify management. A proposal for terminology, 2004.
-
(2004)
A proposal for terminology
-
-
Pfitamann, A.1
Hansen, M.2
-
15
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information
-
P. Sammarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information. In PODS, 1998.
-
(1998)
PODS
-
-
Sammarati, P.1
Sweeney, L.2
-
16
-
-
0011584005
-
Uniqueness of simple demographics in the u.s. population
-
Technical report, Carnegie Mellon University
-
L.Sweeney. Uniqueness of simple demographics in the u.s. population. Technical report, Carnegie Mellon University, 2000.
-
(2000)
-
-
Sweeney, L.1
-
19
-
-
19544380211
-
Bottom-up generalization: A data mining solution to privacy protection
-
K. Wang, P. S. Yu, and S. Chakraborty. Bottom-up generalization: A data mining solution to privacy protection. In ICDM, 2004.
-
(2004)
ICDM
-
-
Wang, K.1
Yu, P.S.2
Chakraborty, S.3
-
20
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
X. Xiao and Y. Tao. Anatomy: simple and effective privacy preservation. In VLDB, 2006.
-
(2006)
VLDB
-
-
Xiao, X.1
Tao, Y.2
-
21
-
-
34250680246
-
Peraonalized privacy preservation
-
X. Xiao and Y. Tao. Peraonalized privacy preservation. In SIGMOD, 2006.
-
(2006)
SIGMOD
-
-
Xiao, X.1
Tao, Y.2
-
22
-
-
33745599656
-
Checking for kanonymity violation by views
-
C. Yao, X. S. Wang, and S. Jajodia. Checking for kanonymity violation by views. In VLDB, 2005.
-
(2005)
VLDB
-
-
Yao, C.1
Wang, X.S.2
Jajodia, S.3
|