-
1
-
-
77049087087
-
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005, LNCS, 3363, pp. 246-258. Springer, Heidelberg (2005)
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005, LNCS, vol. 3363, pp. 246-258. Springer, Heidelberg (2005)
-
-
-
-
2
-
-
58349104271
-
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. Journal of Privacy Technology, paper number 20051120001
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. Journal of Privacy Technology, paper number 20051120001
-
-
-
-
4
-
-
38049126170
-
Efficient k-Anonymization using Clustering Techniques
-
Kotagiri, R, Radha Krishna, P, Mohania, M, Nantajeewarawat, E, eds, DASFAA 2007, Springer, Heidelberg
-
Byun, J., Kamra, A., Bertino, E., Li, N.: Efficient k-Anonymization using Clustering Techniques. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 188-200. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4443
, pp. 188-200
-
-
Byun, J.1
Kamra, A.2
Bertino, E.3
Li, N.4
-
5
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Tokyo, Japan
-
Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: Proc. of the 21st International Conference on Data Engineering (ICDE 2005), Tokyo, Japan (2005)
-
(2005)
Proc. of the 21st International Conference on Data Engineering (ICDE
-
-
Fung, B.1
Wang, K.2
Yu, P.3
-
6
-
-
29844444250
-
-
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: Efficient Full-Domain kAnonymity. In: ACM SIGMOD International Conference on Management of Data (June 2005)
-
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: Efficient Full-Domain kAnonymity. In: ACM SIGMOD International Conference on Management of Data (June 2005)
-
-
-
-
7
-
-
34548805858
-
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
-
Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In: ICDE 2007, pp. 106-115 (2007)
-
(2007)
ICDE 2007
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
8
-
-
33749607006
-
l-Diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: Privacy beyond k-anonymity. In: ICDE 2006 (2006)
-
(2006)
ICDE 2006
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
9
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
Paris, France, pp
-
Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: Proc. of the 23rd ACM-SIGMOD-SIGACT-SIGART Symposium on the Principles of Database Systems, Paris, France, pp. 223-228 (2004)
-
(2004)
Proc. of the 23rd ACM-SIGMOD-SIGACT-SIGART Symposium on the Principles of Database Systems
, pp. 223-228
-
-
Meyerson, A.1
Williams, R.2
-
10
-
-
33745834241
-
-
University of Califonia, Irvine
-
Newman, D.J., Hettich, S., Blake, C.L., Merz, C.J.: UCI Repository of Machine Learning Databases, University of Califonia, Irvine (1998), www.ics.uci.edu/~mlearn/MLRepository.html
-
(1998)
UCI Repository of Machine Learning Databases
-
-
Newman, D.J.1
Hettich, S.2
Blake, C.L.3
Merz, C.J.4
-
11
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P.: Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010-1027 (2001)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
12
-
-
84868689050
-
-
Sun, X., Li, M., Wang, H., Plank, A.: An efficient hash-based algorithm for minimal k-anonymity problem. In: 31st Australasian Computer Science Conference (ACSC 2008), Wollongong, NSW, Australia, pp. 101-107. CRPIT 74 (2008)
-
Sun, X., Li, M., Wang, H., Plank, A.: An efficient hash-based algorithm for minimal k-anonymity problem. In: 31st Australasian Computer Science Conference (ACSC 2008), Wollongong, NSW, Australia, pp. 101-107. CRPIT 74 (2008)
-
-
-
-
13
-
-
43749088488
-
-
Sun, X., Wang, H., Li, J.: On the complexity of restricted k-anonymity problem. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, 4976, pp. 287-296. Springer, Heidelberg (2008)
-
Sun, X., Wang, H., Li, J.: On the complexity of restricted k-anonymity problem. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 287-296. Springer, Heidelberg (2008)
-
-
-
-
14
-
-
51849099051
-
-
+, a)-sensitive k-anonymity: a new enhanced privacy protection model. In: 8th IEEE International Conference on Computer and Information Technology (IEEE-CIT 2008), July 8-11, pp. 59-64 (2008)
-
+, a)-sensitive k-anonymity: a new enhanced privacy protection model. In: 8th IEEE International Conference on Computer and Information Technology (IEEE-CIT 2008), July 8-11, pp. 59-64 (2008)
-
-
-
-
19
-
-
33749571958
-
-
Wong, R., Li, J., Fu, A., Wang, K.: (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: KDD 2006, pp. 754-759 (2006)
-
Wong, R., Li, J., Fu, A., Wang, K.: (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: KDD 2006, pp. 754-759 (2006)
-
-
-
|