-
2
-
-
34250661905
-
Achieving anonymity via clustering
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. In Proc. of ACM Symposium on Principles of Database Systems (PODS), pages 153-162, 2006.
-
(2006)
Proc. of ACM Symposium on Principles of Database Systems (PODS)
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
3
-
-
77049087087
-
Anonymizing tables
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy. D. Thomas, and A. Zhu. Anonymizing tables. In Proc. of International Conference on Database Theory (ICDT), pages 246-258, 2005.
-
(2005)
Proc. of International Conference on Database Theory (ICDT)
, pp. 246-258
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
0242674432
-
Hippocratic databases
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In Proc. of Very Large Data Bases (VLDB), pages 143-154, 2002.
-
(2002)
Proc. of Very Large Data Bases (VLDB)
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
8
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. A CM Transactions on Database Systems (TODS), 23(3):231-285, 1998.
-
(1998)
A CM Transactions on Database Systems (TODS)
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
9
-
-
85001786260
-
Secure and selective dissemination of xml documents
-
E. Bertino and E. Ferrari. Secure and selective dissemination of xml documents. ACM Trans. Inf. Syst. Secur., 5(3):290-331, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur
, vol.5
, Issue.3
, pp. 290-331
-
-
Bertino, E.1
Ferrari, E.2
-
10
-
-
33244468835
-
Practical privacy: The sulq framework
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the sulq framework. In Proc. of ACM Symposium on Principles of Database Systems (PODS), pages 128-138, 2005.
-
(2005)
Proc. of ACM Symposium on Principles of Database Systems (PODS)
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
11
-
-
33750732631
-
Secure anonymization for incremental datasets
-
J.-W. Byun, Y. Sohn, E. Bertino, and N. Li. Secure anonymization for incremental datasets. In Secure Data Management (SDM), pages 48-63, 2006.
-
(2006)
Secure Data Management (SDM)
, pp. 48-63
-
-
Byun, J.-W.1
Sohn, Y.2
Bertino, E.3
Li, N.4
-
13
-
-
34548748588
-
On multidimensional k-anonymity with local recoding generalization
-
Y. Du, T. Xia, Y. Tao, D. Zhang, and F. Zhu. On multidimensional k-anonymity with local recoding generalization. In Proc. of International Conference on Data Engineering (ICDE), pages 1422-1424, 2007.
-
(2007)
Proc. of International Conference on Data Engineering (ICDE)
, pp. 1422-1424
-
-
Du, Y.1
Xia, T.2
Tao, Y.3
Zhang, D.4
Zhu, F.5
-
14
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference (TCC), pages 265-284, 2006.
-
(2006)
Theory of Cryptography Conference (TCC)
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
15
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. V. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In Proc. of ACM Symposium, on Principles of Database Systems (PODS), pages 211-222, 2003.
-
(2003)
Proc. of ACM Symposium, on Principles of Database Systems (PODS)
, pp. 211-222
-
-
Evfimievski, A.V.1
Gehrke, J.2
Srikant, R.3
-
18
-
-
84988315609
-
Fast data anonymization with low information loss
-
G. Ghinita, P. Karras, P. Kalnis, and N. Mamoulis. Fast data anonymization with low information loss. In Proc. of Very Large Data Bases (VLDB), pages 758-769, 2007.
-
(2007)
Proc. of Very Large Data Bases (VLDB)
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
19
-
-
85011028519
-
K-anonymization as spatial indexing: Toward scalable and incremental anonymization
-
T. Iwuchukwu and J. F. Naughton. K-anonymization as spatial indexing: Toward scalable and incremental anonymization. In Proc. of Very Large Data Bases (VLDB), pages 746-757, 2007.
-
(2007)
Proc. of Very Large Data Bases (VLDB)
, pp. 746-757
-
-
Iwuchukwu, T.1
Naughton, J.F.2
-
21
-
-
36048997303
-
A secure distributed framework for achieving k-anonymity
-
W. Jiang and C. Clifton. A secure distributed framework for achieving k-anonymity. The VLDB Journal, 15(4):316-333, 2006.
-
(2006)
The VLDB Journal
, vol.15
, Issue.4
, pp. 316-333
-
-
Jiang, W.1
Clifton, C.2
-
26
-
-
34548805858
-
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and 1-diversity. In Proc. of International Conference on Data Engineering (ICDE), pages 106-115, 2007.
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and 1-diversity. In Proc. of International Conference on Data Engineering (ICDE), pages 106-115, 2007.
-
-
-
-
27
-
-
33749607006
-
1-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. 1-diversity: Privacy beyond k-anonymity. In Proc. of International Conference on Data Engineering (ICDE), page 24, 2006.
-
(2006)
Proc. of International Conference on Data Engineering (ICDE)
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
28
-
-
35449000866
-
Worst-case background knowledge in privacy
-
D. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Halpern. Worst-case background knowledge in privacy. In Proc. of International Conference on Data Engineering (ICDE), 2007.
-
(2007)
Proc. of International Conference on Data Engineering (ICDE)
-
-
Martin, D.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.5
-
30
-
-
84862604885
-
Towards robustness in query auditing
-
S. U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani. Towards robustness in query auditing. In Proc. of Very Large Data Bases (VLDB), pages 151-162, 2006.
-
(2006)
Proc. of Very Large Data Bases (VLDB)
, pp. 151-162
-
-
Nabar, S.U.1
Marthi, B.2
Kenthapadi, K.3
Mishra, N.4
Motwani, R.5
-
34
-
-
4544352907
-
Some facets of complexity theory and cryptography: A five-lecture tutorial
-
J. Rothe. Some facets of complexity theory and cryptography: A five-lecture tutorial. ACM Computing Surveys, 34(4):504-549, 2002.
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.4
, pp. 504-549
-
-
Rothe, J.1
-
36
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
L. Sweeney, k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness, and, Knowlege-Based Systems, 10(5):557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness, and, Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
39
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
R. C.-W. Wong, A. W.-C. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In Proc. of Very Large Data Bases (VLDB), pages 543-554, 2007.
-
(2007)
Proc. of Very Large Data Bases (VLDB)
, pp. 543-554
-
-
Wong, R.C.-W.1
Fu, A.W.-C.2
Wang, K.3
Pei, J.4
-
40
-
-
33749571958
-
-
R. C.-W. Wong, J. Li, A. W.-C. Fu, and K. Wang, (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In Proc. of ACM Knowledge Discovery and Data Alining (SIGKDD), pages 754-759, 2006.
-
R. C.-W. Wong, J. Li, A. W.-C. Fu, and K. Wang, (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In Proc. of ACM Knowledge Discovery and Data Alining (SIGKDD), pages 754-759, 2006.
-
-
-
-
41
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In Proc. of Very Large Data Bases (VLDB), pages 139-150, 2006.
-
(2006)
Proc. of Very Large Data Bases (VLDB)
, pp. 139-150
-
-
Xiao, X.1
Tao, Y.2
-
42
-
-
35448967088
-
m-invariance: Towards privacy preserving re-publication of dynamic datasets
-
X. Xiao and Y. Tao. m-invariance: towards privacy preserving re-publication of dynamic datasets. In Proc. of ACM Management of Data (SIGMOD), pages 689-700, 2007.
-
(2007)
Proc. of ACM Management of Data (SIGMOD)
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
43
-
-
33749582207
-
Utility-based anonymization using local recoding
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu. Utility-based anonymization using local recoding. In Proc. of ACM Knowledge Discovery and Data Mining (SIGKDD), pages 785-790, 2006.
-
(2006)
Proc. of ACM Knowledge Discovery and Data Mining (SIGKDD)
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.-C.6
-
44
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
Q. Zhang, N. Koudas, D. Srivastava, and T. Yu. Aggregate query answering on anonymized tables. In Proc. of International Conference on Data Engineering (ICDE), pages 116-125, 2007.
-
(2007)
Proc. of International Conference on Data Engineering (ICDE)
, pp. 116-125
-
-
Zhang, Q.1
Koudas, N.2
Srivastava, D.3
Yu, T.4
|