-
1
-
-
34250661905
-
Achieving anonymity via clustering
-
O. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. In PODS, 2006.
-
(2006)
PODS
-
-
Aggarwal, O.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
2
-
-
33746052559
-
Anonymizing tables
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In ICDT, 2005.
-
(2005)
ICDT
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
3
-
-
33746711412
-
Approximation algorithms for k-anonymity
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Approximation algorithms for k-anonymity. Journal of Privacy Technology, 2005.
-
(2005)
Journal of Privacy Technology
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
5
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD, 2000.
-
(2000)
SIGMOD
-
-
Agrawal, R.1
Srikant, R.2
-
6
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
-
(2005)
ICDE
-
-
Bayardo, R.1
Agrawal, R.2
-
8
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
T. Dalenius. Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15:429-444, 1977.
-
(1977)
Statistik Tidskrift
, vol.15
, pp. 429-444
-
-
Dalenius, T.1
-
9
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS, 2003.
-
(2003)
PODS
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
10
-
-
52649119568
-
-
A. Gionis and T. Tassa, k-Anonymization with minimal loss of information. In ESA, 2007.
-
A. Gionis and T. Tassa, k-Anonymization with minimal loss of information. In ESA, 2007.
-
-
-
-
11
-
-
0242625276
-
-
V. Iyengar, Transforming data to satisfy privacy constraints. In KDD, 2002.
-
V. Iyengar, Transforming data to satisfy privacy constraints. In KDD, 2002.
-
-
-
-
12
-
-
34250673244
-
Injecting utility into anonymized datasets
-
D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In SIGMOD, 2006.
-
(2006)
SIGMOD
-
-
Kifer, D.1
Gehrke, J.2
-
16
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity, In PODS, 2004.
-
(2004)
PODS
-
-
Meyerson, A.1
Williams, R.2
-
18
-
-
0035517699
-
Protecting respondent's privacy in microdata release
-
P. Samarati. Protecting respondent's privacy in microdata release. TKDE, 13:1010-1027, 2001.
-
(2001)
TKDE
, vol.13
, pp. 1010-1027
-
-
Samarati, P.1
-
19
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information
-
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information. In PODS, 1998.
-
(1998)
PODS
-
-
Samarati, P.1
Sweeney, L.2
-
21
-
-
84893853914
-
Anatomy: Simple and Effective Privacy Preservation
-
X. Xiao and Y. Tao. Anatomy: Simple and Effective Privacy Preservation. In VLDB, 2006.
-
(2006)
VLDB
-
-
Xiao, X.1
Tao, Y.2
-
22
-
-
33749582207
-
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu, Utility-based anonymization using local recoding. In KDD, 2006.
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu, Utility-based anonymization using local recoding. In KDD, 2006.
-
-
-
|