-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 515-556 (1989)
-
(1989)
ACM Computing Surveys
, vol.515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
3
-
-
26944445962
-
A.: K-anonymity: Algorithms and hardness
-
Technical report, Stanford University
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: k-anonymity: Algorithms and hardness. Technical report, Stanford University (2004)
-
(2004)
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu7
-
4
-
-
77049087087
-
Anonymizing tables
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing tables. In: 10th International Conference on Database Theory, pp. 246-258 (2005)
-
(2005)
10th International Conference on Database Theory
, pp. 246-258
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
5
-
-
38149080913
-
-
Journal of Privacy Technology
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. Journal of Privacy Technology (2005)
-
(2005)
Approximation algorithms for k-anonymity
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
7
-
-
33646153058
-
Protecting privacy against location-based personal identification
-
Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. Secure Data Management, 185-199 (2005)
-
(2005)
Secure Data Management
, pp. 185-199
-
-
Bettini, C.1
Wang, X.S.2
Jajodia, S.3
-
8
-
-
0011644131
-
Obtaining information while preserving privacy: A markov perturbation method for tabular data
-
Duncan, G.T., Feinberg, S.E.: Obtaining information while preserving privacy: A markov perturbation method for tabular data. In: Joint Statistical Meetings, pp. 351-362 (1997)
-
(1997)
Joint Statistical Meetings
, pp. 351-362
-
-
Duncan, G.T.1
Feinberg, S.E.2
-
9
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: International Conference on Data Engineering, pp. 205-216 (2005)
-
(2005)
International Conference on Data Engineering
, pp. 205-216
-
-
Fung, B.1
Wang, K.2
Yu, P.3
-
12
-
-
29844444250
-
-
LeFevrea, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient fulldomain k-anonymity. In: SIGMOD (2005)
-
LeFevrea, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient fulldomain k-anonymity. In: SIGMOD (2005)
-
-
-
-
13
-
-
33749607006
-
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-diversity: Privacy beyond k-anonymity. In: International Conference on Data Engineering, p. 24 (2006)
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-diversity: Privacy beyond k-anonymity. In: International Conference on Data Engineering, p. 24 (2006)
-
-
-
-
16
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Technical report, CMU, SRI
-
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, CMU, SRI (1998)
-
(1998)
-
-
Samarati, P.1
Sweeney, L.2
|