-
2
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. Adam and J. Worthmann. Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4), 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
-
-
Adam, N.1
Worthmann, J.2
-
3
-
-
33745629638
-
On k-anonymity and the curse of dimensionality
-
C. Aggarwal. On k-anonymity and the curse of dimensionality. In VLDB, 2005.
-
(2005)
VLDB
-
-
Aggarwal, C.1
-
4
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD, 2000.
-
(2000)
SIGMOD
-
-
Agrawal, R.1
Srikant, R.2
-
5
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
-
(2005)
ICDE
-
-
Bayardo, R.1
Agrawal, R.2
-
7
-
-
65449181024
-
-
J.-W. Byun, Y. Sohn, E. Bertino, and N. Li. Secure anonymization for incremental datasets. In SDM, 2006.
-
J.-W. Byun, Y. Sohn, E. Bertino, and N. Li. Secure anonymization for incremental datasets. In SDM, 2006.
-
-
-
-
8
-
-
65449183035
-
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Towards privacy in public databases. In TCC, 2005.
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Towards privacy in public databases. In TCC, 2005.
-
-
-
-
9
-
-
85011039411
-
Privacy skyline: Privacy with multidimensional adversarial knowledge
-
B.-C. Chen, K. LeFevre, and R. Ramakrishnan. Privacy skyline: privacy with multidimensional adversarial knowledge. In VLDB, 2007.
-
(2007)
VLDB
-
-
Chen, B.-C.1
LeFevre, K.2
Ramakrishnan, R.3
-
11
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, 2003.
-
(2003)
PODS
-
-
Dinur, I.1
Nissim, K.2
-
12
-
-
50249086141
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP, 2006.
-
(2006)
ICALP
-
-
Dwork, C.1
-
13
-
-
1142263341
-
Limiting privacy breaches in privacy-preserving data mining
-
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy-preserving data mining. In PODS, 2003.
-
(2003)
PODS
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
14
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
B. Fung, K. Wang, and P. Yu. Top-down specialization for information and privacy preservation. In ICDE, 2005.
-
(2005)
ICDE
-
-
Fung, B.1
Wang, K.2
Yu, P.3
-
15
-
-
0242625276
-
-
V. Iyengar. Transforming data to satisfy privacy constraints. In KDD, 2002.
-
V. Iyengar. Transforming data to satisfy privacy constraints. In KDD, 2002.
-
-
-
-
16
-
-
34250673244
-
Injecting utility into anonymized datasets
-
D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In SIGMOD, 2006.
-
(2006)
SIGMOD
-
-
Kifer, D.1
Gehrke, J.2
-
17
-
-
0000964471
-
Measures of disclosure risk and harm
-
D. Lambert. Measures of disclosure risk and harm. J. Official Stat, 9, 1993.
-
(1993)
J. Official Stat
, vol.9
-
-
Lambert, D.1
-
20
-
-
33749568323
-
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Workload-aware anonymization. In KDD, 2006.
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Workload-aware anonymization. In KDD, 2006.
-
-
-
-
21
-
-
34548805858
-
t-closeness: Privacy beyond k-anonymity and ℓ-diversity
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and ℓ-diversity. In ICDE, 2007.
-
(2007)
ICDE
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
22
-
-
65449120240
-
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond fc-anonymity. In ICDE, 2006.
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond fc-anonymity. In ICDE, 2006.
-
-
-
-
23
-
-
34548748619
-
Worst-case background knowledge for privacy-preserving data publishing
-
D. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Halpern. Worst-case background knowledge for privacy-preserving data publishing. In ICDE, 2007.
-
(2007)
ICDE
-
-
Martin, D.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.5
-
24
-
-
3142686877
-
A formal analysis of information disclosure in data exchange
-
G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, 2004.
-
(2004)
SIGMOD
-
-
Miklau, G.1
Suciu, D.2
-
25
-
-
77951170902
-
Thoughts on k-anonymization
-
M. Nergiz and C. Clifton. Thoughts on k-anonymization. In PDM, 2006.
-
(2006)
In PDM
-
-
Nergiz, M.1
Clifton, C.2
-
26
-
-
35448937300
-
Hiding the presence of individuals from shared database
-
M. Nergiz, M. Atzori, and C. Clifton. Hiding the presence of individuals from shared database. In SIGMOD, 2007.
-
(2007)
SIGMOD
-
-
Nergiz, M.1
Atzori, M.2
Clifton, C.3
-
29
-
-
35448962139
-
Approximate algorithms for k-anonymity
-
H. Park and K. Shim. Approximate algorithms for k-anonymity. In SIGMOD, 2007.
-
(2007)
SIGMOD
-
-
Park, H.1
Shim, K.2
-
30
-
-
85011019712
-
The boundary between privacy and utility in data publishing
-
V. Rastogi, D. Suciu, and S. Hong. The boundary between privacy and utility in data publishing. In VLDB, 2007.
-
(2007)
VLDB
-
-
Rastogi, V.1
Suciu, D.2
Hong, S.3
-
32
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
L. Sweeney. Weaving technology and policy together to maintain confidentiality. J. of Law, Medicine and Ethics, 25(2-3):98-110, 1997.
-
(1997)
J. of Law, Medicine and Ethics
, vol.25
, Issue.2-3
, pp. 98-110
-
-
Sweeney, L.1
-
33
-
-
85150404048
-
-
L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):571-588, 2002.
-
L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):571-588, 2002.
-
-
-
-
34
-
-
0036811662
-
-
L. Sweeney, k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):557-570, 2002.
-
L. Sweeney, k-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., 10(5):557-570, 2002.
-
-
-
-
36
-
-
65449172297
-
-
T. Truta and B. Vinay. Privacy protection: p-sensitive k-anonymity property. In PDM, 2006.
-
T. Truta and B. Vinay. Privacy protection: p-sensitive k-anonymity property. In PDM, 2006.
-
-
-
-
37
-
-
33749581232
-
-
K. Wang and B. Fung. Anonymizing sequential releases. In KDD, 2006.
-
K. Wang and B. Fung. Anonymizing sequential releases. In KDD, 2006.
-
-
-
-
38
-
-
33749568934
-
Template-based privacy preservation in classification problems
-
K. Wang, B. Fung, and P. Yu. Template-based privacy preservation in classification problems. In ICDM, 2005.
-
(2005)
ICDM
-
-
Wang, K.1
Fung, B.2
Yu, P.3
-
39
-
-
84868919040
-
-
R. Wong, J. Ii, A. Fu, and K. Wang. (α,k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In KDD, 2006.
-
R. Wong, J. Ii, A. Fu, and K. Wang. (α,k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In KDD, 2006.
-
-
-
-
40
-
-
35448967088
-
m-invariance: Towards privacy preserving re-publication of dynamic datasets
-
X. Xiao and T. Tao. m-invariance: Towards privacy preserving re-publication of dynamic datasets. In SIGMOD, 2007.
-
(2007)
SIGMOD
-
-
Xiao, X.1
Tao, T.2
-
41
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In VLDB, 2006.
-
(2006)
VLDB
-
-
Xiao, X.1
Tao, Y.2
-
42
-
-
34250680246
-
Personalized privacy protection
-
X. Xiao and Y. Tao. Personalized privacy protection. In SIGMOD, 2006.
-
(2006)
SIGMOD
-
-
Xiao, X.1
Tao, Y.2
-
43
-
-
66249085387
-
-
L. Zhang, S. Jajodia, and A. Brodsky. Information disclosure under realistic assumptions: Privacy versus optimality. In CCS, 2007.
-
L. Zhang, S. Jajodia, and A. Brodsky. Information disclosure under realistic assumptions: Privacy versus optimality. In CCS, 2007.
-
-
-
|