-
3
-
-
77952412301
-
Bounds for cell entries in two-way tables given conditional relative frequencies
-
A. Slavkovic and S. E. Feinberg. Bounds for cell entries in two-way tables given conditional relative frequencies. Privacy in Statistical Databases, 2004.
-
(2004)
Privacy in Statistical Databases
-
-
Slavkovic, A.1
Feinberg, S.E.2
-
5
-
-
34250673244
-
Injecting utility into anonymized datasets
-
D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In SIGMOD, 2006.
-
(2006)
SIGMOD
-
-
Kifer, D.1
Gehrke, J.2
-
6
-
-
0018444418
-
Secure databases: Protection against user influence
-
D. P. Dobkin, A. K. Jones, and R. J. Lipton. Secure databases: Protection against user influence. ACM: Transactions on Database Systems (TODS), 4 (1):76-96, 1979.
-
(1979)
ACM: Transactions on Database Systems (TODS)
, vol.4
, Issue.1
, pp. 76-96
-
-
Dobkin, D.P.1
Jones, A.K.2
Lipton, R.J.3
-
7
-
-
0022754707
-
Security problems on inference control for sum, max, and min queries
-
F. Chin. Security problems on inference control for sum, max, and min queries. J. ACM, 33 (3):451-464, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.3
, pp. 451-464
-
-
Chin, F.1
-
8
-
-
26944445962
-
K-anonymity: Algorithms and hardness
-
Stanford University
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. k-anonymity: Algorithms and hardness. Technical report, Stanford University, 2004.
-
(2004)
Technical Report
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
9
-
-
3142686877
-
A formal analysis of information disclosure in data exchange
-
G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, 2004.
-
(2004)
SIGMOD
-
-
Miklau, G.1
Suciu, D.2
-
10
-
-
0011644131
-
Obtaining information while preserving privacy: A markov perturbation method for tabular data
-
Anaheim, CA
-
G. T. Duncan and S. E. Feinberg. Obtaining information while preserving privacy: A markov perturbation method for tabular data. In Joint Statistical Meetings. Anaheim, CA, 1997.
-
(1997)
Joint Statistical Meetings
-
-
Duncan, G.T.1
Feinberg, S.E.2
-
13
-
-
0016409563
-
Identification and retrieval of personal records from a statistical bank
-
J. Schlorer. Identification and retrieval of personal records from a statistical bank. In Methods Info. Med., 1975.
-
(1975)
Methods Info. Med.
-
-
Schlorer, J.1
-
16
-
-
50249160873
-
Solving confidentiality protection problems in tabulations using network optimization: A network model for cell suppression in the U.S. economic censuses
-
International Statistical Institute, Dublin
-
L. H. Cox. Solving confidentiality protection problems in tabulations using network optimization: A network model for cell suppression in the u.s. economic censuses. In Proceedings of the Internatinal Seminar on Statistical Confidentiality, pages 229-245. International Statistical Institute, Dublin, 1982.
-
(1982)
Proceedings of the Internatinal Seminar on Statistical Confidentiality
, pp. 229-245
-
-
Cox, L.H.1
-
18
-
-
84924515134
-
Suppression, methodology and statistical disclosure control
-
L. H. Cox. Suppression, methodology and statistical disclosure control. Journal of the American Statistical Association, 90:1453-1462, 1995.
-
(1995)
Journal of the American Statistical Association
, vol.90
, pp. 1453-1462
-
-
Cox, L.H.1
-
21
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. R. Adam and J. C. Wortmann. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv., 21 (4):515-556, 1989.
-
(1989)
ACM Comput. Surv.
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
22
-
-
0032387555
-
Algebraic algorithms for sampling from conditional distributions
-
P. Diaconis and B. Sturmfels. Algebraic algorithms for sampling from conditional distributions. Annals of Statistics, 1:363-397, 1998.
-
(1998)
Annals of Statistics
, vol.1
, pp. 363-397
-
-
Diaconis, P.1
Sturmfels, B.2
-
24
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
CMU, SRI
-
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, CMU, SRI, 1998.
-
(1998)
Technical Report
-
-
Samarati, P.1
Sweeney, L.2
-
25
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
R. J. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE-2005, 2005.
-
(2005)
ICDE-2005
-
-
Bayardo, R.J.1
Agrawal, R.2
-
26
-
-
33745547205
-
Toward privacy in public databases
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In Theory of Cryptography Conference, 2005.
-
(2005)
Theory of Cryptography Conference
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
28
-
-
34250680246
-
Personalized privacy preservation
-
X. Xiao and Y. Tao. Personalized privacy preservation. In SIGMOD, 2006.
-
(2006)
SIGMOD
-
-
Xiao, X.1
Tao, Y.2
|