-
2
-
-
34250661905
-
Achieving anonymity via clustering
-
Chicago, IL, USA
-
G. Aggrawal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas and A. Zhu, Achieving anonymity via clustering, in: Proceedings of the ACM Symposium on Principles of Database Systems (PODS), Chicago, IL, USA, 2006.
-
(2006)
Proceedings of the ACM Symposium on Principles of Database Systems (PODS)
-
-
Aggrawal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
38049041399
-
Efficient k-anonymization using clustering techniques
-
Bangkok, Thailand
-
J.-W. Byun, A. Kamra, E. Bertino and N. Li, Efficient k-anonymization using clustering techniques, in: Proceedings of the International Conference on Database Systems for Advanced Applications (DASFAA), Bangkok, Thailand, 2007.
-
(2007)
Proceedings of the International Conference on Database Systems for Advanced Applications (DASFAA)
-
-
Byun, J.-W.1
Kamra, A.2
Bertino, E.3
Li, N.4
-
5
-
-
35248860015
-
Secure anonymization for incremental datasets
-
Seoul, Korea
-
J.-W. Byun, Y. Sohn, E. Bertino and N. Li, Secure anonymization for incremental datasets, in: Secure Data Management, Seoul, Korea, 2006.
-
(2006)
Secure Data Management
-
-
Byun, J.-W.1
Sohn, Y.2
Bertino, E.3
Li, N.4
-
6
-
-
0004238984
-
-
Addison-Wesley Longman Publishing Co, Inc, Harlow, Essex, UK
-
D. Denning, Cryptography and Data Security, Addison-Wesley Longman Publishing Co., Inc., Harlow, Essex, UK, 1982.
-
(1982)
Cryptography and Data Security
-
-
Denning, D.1
-
7
-
-
0001751897
-
Disclosure limitation methods and information loss for tabular data
-
Elsevier, Amsterdam, The Netherlands
-
G.T. Duncan, S.E. Fienberg, R. Krishnan, R. Padman and S.F. Roehrig, Disclosure limitation methods and information loss for tabular data, in: Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, Elsevier, Amsterdam, The Netherlands, 2001, pp. 135-166.
-
(2001)
Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies
, pp. 135-166
-
-
Duncan, G.T.1
Fienberg, S.E.2
Krishnan, R.3
Padman, R.4
Roehrig, S.F.5
-
8
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Tokyo, Japan
-
B.C.M. Fung, K. Wang and P.S. Yu, Top-down specialization for information and privacy preservation, in: Proceedings of the International Conference on Data Engineering (ICDE), Tokyo, Japan, 2005.
-
(2005)
Proceedings of the International Conference on Data Engineering (ICDE)
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
10
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
Istanbul, Turkey
-
N. Koudas, D. Srivastava, T. Yu and Q. Zhang, Aggregate query answering on anonymized tables, in: Proceedings of the International Conference on Data Engineering (ICDE), Istanbul, Turkey, 2007.
-
(2007)
Proceedings of the International Conference on Data Engineering (ICDE)
-
-
Koudas, N.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
11
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
Baltimore, MD, USA
-
K. LeFevre, D. DeWitt and R. Ramakrishnan, Incognito: Efficient full-domain k-anonymity, in: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), Baltimore, MD, USA, 2005.
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD)
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
12
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
Atlanta, GA, USA
-
K. LeFevre, D. DeWitt and R. Ramakrishnan, Mondrian multidimensional k-anonymity, in: Proceedings of the International Conference on Data Engineering (ICDE), Atlanta, GA, USA, 2006.
-
(2006)
Proceedings of the International Conference on Data Engineering (ICDE)
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
13
-
-
34548805858
-
-
N. Li, T. Li and S. Venkatasubramanian, t-closeness: Privacy beyond k-anonymity and ℓ-diversity, in: Proceedings of the International Conference on Data Engineering (ICDE), Istanbul, Turkey, 2007.
-
N. Li, T. Li and S. Venkatasubramanian, t-closeness: Privacy beyond k-anonymity and ℓ-diversity, in: Proceedings of the International Conference on Data Engineering (ICDE), Istanbul, Turkey, 2007.
-
-
-
-
14
-
-
39749201160
-
Towards optimal k-anonymization
-
Elsevier, Amsterdam, The Netherlands
-
T. Li and N. Li, Towards optimal k-anonymization, in: Data & Knowledge Engineering, Elsevier, Amsterdam, The Netherlands, 2008.
-
(2008)
Data & Knowledge Engineering
-
-
Li, T.1
Li, N.2
-
16
-
-
58149089560
-
L.-diversity: Privacy beyond k-anonymity
-
Tokyo, Japan
-
A. Machanavajjhala, J. Gehrke, D. Kifer and M. Venkitasubramaniam, L.-diversity: Privacy beyond k-anonymity, in: Proceedings of the International Conference on Data Engineering (ICDE), Tokyo, Japan, 2005.
-
(2005)
Proceedings of the International Conference on Data Engineering (ICDE)
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
20
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International
-
P. Samarati and L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.
-
(1998)
-
-
Samarati, P.1
Sweeney, L.2
-
23
-
-
33749581232
-
Anonymizing sequential releases
-
Philadelphia, PA, USA
-
K. Wang and B.C.M. Fung, Anonymizing sequential releases, in: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), Philadelphia, PA, USA, 2006, pp. 414-423.
-
(2006)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
, pp. 414-423
-
-
Wang, K.1
Fung, B.C.M.2
-
24
-
-
33749571958
-
-
R.C.-W Wong, J. Li, A.W.-C. Fu and K. Wang, (α,k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), Philadelphia, PA, USA, 2006, pp. 754-759.
-
R.C.-W Wong, J. Li, A.W.-C. Fu and K. Wang, (α,k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), Philadelphia, PA, USA, 2006, pp. 754-759.
-
-
-
-
25
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
Seoul, Korea
-
X. Xiao and Y. Tao, Anatomy: simple and effective privacy preservation, in: Proceedings of the International Conference on Very Large Data Bases (VLDB), Seoul, Korea, 2006, pp. 139-150.
-
(2006)
Proceedings of the International Conference on Very Large Data Bases (VLDB)
, pp. 139-150
-
-
Xiao, X.1
Tao, Y.2
-
26
-
-
34250680246
-
Personalized privacy preservation
-
Chicago, IL, USA
-
X. Xiao and Y. Tao, Personalized privacy preservation, in: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), Chicago, IL, USA, 2006, pp. 229-240.
-
(2006)
Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD)
, pp. 229-240
-
-
Xiao, X.1
Tao, Y.2
-
27
-
-
35448967088
-
M-invariance: Towards privacy preserving re-publication of dynamic datasets
-
Beijing, China
-
X. Xiao and Y. Tao, M-invariance: towards privacy preserving re-publication of dynamic datasets, in : Proceedings of the ACMSIGMOD International Conference on Management of Data (SIGMOD), Beijing, China, 2007, pp. 689-700.
-
(2007)
Proceedings of the ACMSIGMOD International Conference on Management of Data (SIGMOD)
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
28
-
-
33745599656
-
Checking for k-anonymity violation by views
-
Trondheim, Norway
-
C. Yao, X.S. Wang and S. Jajodia, Checking for k-anonymity violation by views, in: Proceedings of the International Conference on Very Large Data Bases (VLDB), Trondheim, Norway, 2005.
-
(2005)
Proceedings of the International Conference on Very Large Data Bases (VLDB)
-
-
Yao, C.1
Wang, X.S.2
Jajodia, S.3
|