-
1
-
-
38149080913
-
Approximation algorithms for k-anonymity
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu, "Approximation Algorithms for k-Anonymity, " Proc. 10th Int'l Conf. Database Theory (ICDT), 2005.
-
(2005)
Proc. 10th Int'l Conf. Database Theory (ICDT)
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
6
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim, "Practical Privacy: The SuLQ Framework, " Proc. 24th ACM SIGMOD-SIGACTSIGART Symp. Principles of Database Systems (PODS), 2005.
-
(2005)
Proc. 24th ACM SIGMOD-SIGACTSIGART Symp. Principles of Database Systems (PODS)
-
-
Blum, A.1
Dwork, C.2
Mcsherry, F.3
Nissim, K.4
-
7
-
-
33745547205
-
Toward privacy in public databases
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee, "Toward Privacy in Public Databases, " Proc. Second Theory of Cryptography Conf. (TCC), 2005.
-
(2005)
Proc. Second Theory of Cryptography Conf. (TCC)
-
-
Chawla, S.1
Dwork, C.2
Mcsherry, F.3
Smith, A.4
Wee, H.5
-
8
-
-
0000301097
-
A greedy heuristic for the set-covering problem
-
V. Chvatal, "A Greedy Heuristic for the Set-Covering Problem, " Math. of Operations Research, vol. 4, no. 3, pp. 233-235, 1979.
-
(1979)
Math. of Operations Research
, vol.4
, Issue.3
, pp. 233-235
-
-
Chvatal, V.1
-
9
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
T. Dalenius, "Towards a Methodology for Statistical Disclosure Control, " Statistik Tidskrift, vol. 15, pp. 429-444, 1977.
-
(1977)
Statistik Tidskrift
, vol.15
, pp. 429-444
-
-
Dalenius, T.1
-
10
-
-
38049034011
-
Information loss through global recoding and local suppression
-
A.G. DeWaal and L.C.R.J. Willenborg, "Information Loss through Global Recoding and Local Suppression, " Netherlands Official Statistics, special issue on SDC, vol. 14, pp. 17-20, 1999.
-
(1999)
Netherlands Official Statistics, Special Issue on SDC
, vol.14
, pp. 17-20
-
-
Dewaal, A.G.1
Willenborg, L.C.R.J.2
-
12
-
-
33746335051
-
Differential privacy
-
C. Dwork, "Differential Privacy, " Proc. 33rd Int'l Colloquium Automata, Languages and Programming (ICALP '06), part II, pp. 1-12, 2006.
-
(2006)
Proc. 33rd Int'l Colloquium Automata, Languages and Programming (ICALP '06)
, Issue.PART 2
, pp. 1-12
-
-
Dwork, C.1
-
19
-
-
0016349356
-
Approximation algorithms for combinatorial problems
-
D.S. Johnson, "Approximation Algorithms for Combinatorial Problems, " J. Computer and System Sciences, vol. 9, pp. 256-278, 1974.
-
(1974)
J. Computer and System Sciences
, vol.9
, pp. 256-278
-
-
Johnson, D.S.1
-
21
-
-
0037929598
-
Auditing boolean attributes
-
J. Kleinberg, C. Papadimitriou, and P. Raghavan, "Auditing Boolean Attributes, " J. Computer and System Sciences, vol. 6, pp. 244-253, 2003.
-
(2003)
J. Computer and System Sciences
, vol.6
, pp. 244-253
-
-
Kleinberg, J.1
Papadimitriou, C.2
Raghavan, P.3
-
22
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas, "Privacy Preserving Data Mining, " J. Cryptology, vol. 15, no. 3, pp. 177-206, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
24
-
-
0035517699
-
Protecting respondent's privacy in microdata release
-
P. Samarati, "Protecting Respondent's Privacy in Microdata Release, " IEEE Trans. Knowledge and Data Eng., vol. 13, pp. 1010-1027, 2001.
-
(2001)
IEEE Trans. Knowledge and Data Eng.
, vol.13
, pp. 1010-1027
-
-
Samarati, P.1
-
26
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy, " Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
|