-
2
-
-
34250661905
-
Achieving anonymity via clustering
-
New York, NY, USA, ACM
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. In Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium, on Principles of database systems (PODS'06), pages 153-162, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium, on Principles of database systems (PODS'06)
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
3
-
-
77049087087
-
Anonymizing tables
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In Proceedings of the 10th International Conference on Database Theory (ICDT'05), pages 246-258, 2005.
-
(2005)
Proceedings of the 10th International Conference on Database Theory (ICDT'05)
, pp. 246-258
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
33746711412
-
Approximation algorithms for k-anonymity
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Approximation algorithms for k-anonymity. Journal of Privacy Technology, (2005112001), 2005.
-
(2005)
Journal of Privacy Technology
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
5
-
-
0036042175
-
Models and issues in data stream systems
-
Madison, WI, June
-
B. Babcock, S. Babu, M. Datar, R. Motwani, and J. Widom. Models and issues in data stream systems. In Proceedings of the 21st ACM SIGACT-SIGMOD-SIGART Symposium, on Principles of Database Systems (PODS'02), Madison, WI, June 2002.
-
(2002)
Proceedings of the 21st ACM SIGACT-SIGMOD-SIGART Symposium, on Principles of Database Systems (PODS'02)
-
-
Babcock, B.1
Babu, S.2
Datar, M.3
Motwani, R.4
Widom, J.5
-
6
-
-
10644244988
-
Sampling from a moving window over streaming data
-
Philadelphia, PA, USA, Society for Industrial and Applied Mathematics
-
B. Babcock, M. Datar, and R. Motwani. Sampling from a moving window over streaming data. In Proceedings of the 13th annual ACM-SIAM symposium on Discrete algorithms (SODA '02), pages 633-634, Philadelphia, PA, USA, 2002. Society for Industrial and Applied Mathematics.
-
(2002)
Proceedings of the 13th annual ACM-SIAM symposium on Discrete algorithms (SODA '02)
, pp. 633-634
-
-
Babcock, B.1
Datar, M.2
Motwani, R.3
-
8
-
-
0016557674
-
Multidimensional binary search trees used for associative searching
-
J. L. Bentley. Multidimensional binary search trees used for associative searching. Commun. ACM, 18(9):509-517, 1975.
-
(1975)
Commun. ACM
, vol.18
, Issue.9
, pp. 509-517
-
-
Bentley, J.L.1
-
9
-
-
52649103915
-
Castle: A delay-constrained scheme for ks-anonymizing data streams
-
IEEE
-
J. Cao, B. Carminati, E. Ferrari, and K.-L. Tan. Castle: A delay-constrained scheme for ks-anonymizing data streams. In Proceedings of the 24th International Conference on Data Engineering (ICDE'08), pages 1376-1378. IEEE, 2008.
-
(2008)
Proceedings of the 24th International Conference on Data Engineering (ICDE'08)
, pp. 1376-1378
-
-
Cao, J.1
Carminati, B.2
Ferrari, E.3
Tan, K.-L.4
-
11
-
-
43349106146
-
-
B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Anonymity for continuous data publishing. In Proceedings of the 11th International Conference on Extending Database Technology (EDBT'08), Nantes, France, March 2008. ACM Press.
-
B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Anonymity for continuous data publishing. In Proceedings of the 11th International Conference on Extending Database Technology (EDBT'08), Nantes, France, March 2008. ACM Press.
-
-
-
-
12
-
-
84988315609
-
Fast data anonymization with low information loss
-
VLDB Endowment
-
G. Ghinita, P. Karras, P. Kalnis, and N. Mamoulis. Fast data anonymization with low information loss. In Proceedings of the 33rd international conference on Very large data bases (VLDB'07), pages 758-769. VLDB Endowment, 2007.
-
(2007)
Proceedings of the 33rd international conference on Very large data bases (VLDB'07)
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
13
-
-
0034819401
-
Data streams and historgrams
-
Crete, Greece, July
-
S. Guha, N. Koudas, and L. Shim. Data streams and historgrams. In Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC'00), pages 471-475, Crete, Greece, July 2001.
-
(2001)
Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC'00)
, pp. 471-475
-
-
Guha, S.1
Koudas, N.2
Shim, L.3
-
16
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
New York, NY, USA, ACM Press
-
V. S. Iyengar. Transforming data to satisfy privacy constraints. In Proceedings of the 8th A CM SIGKDD international conference on Knowledge discovery and data mining (KDD'02), pages 279-288, New York, NY, USA, 2002. ACM Press.
-
(2002)
Proceedings of the 8th A CM SIGKDD international conference on Knowledge discovery and data mining (KDD'02)
, pp. 279-288
-
-
Iyengar, V.S.1
-
17
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In Proceedings of the 24th ACM SIGMOD International Conference on Management of Data (SIGMOD'0,5), pages 49-60, 2005.
-
(2005)
Proceedings of the 24th ACM SIGMOD International Conference on Management of Data (SIGMOD'0,5)
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
18
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
Atlanta, GA, USA, April, IEEE
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In Proceedings of the 22nd International Conference on Data Engineering (ICDE'06), Atlanta, GA, USA, April 2006. IEEE.
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering (ICDE'06)
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
19
-
-
33749568323
-
Workload-aware anonymization
-
New York, NY, USA, ACM Press
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Workload-aware anonymization. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD'06), pages 277-286, New York, NY, USA, 2006. ACM Press.
-
(2006)
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD'06)
, pp. 277-286
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
21
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
Washington, DC, USA, IEEE Computer Society
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. In Proceedings of the 22nd International Conference on Data Engineering (ICDE'06), page 24, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering (ICDE'06)
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
22
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
New York, NY, USA, ACM Press
-
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS'04), pages 223-228, New York, NY, USA, 2004. ACM Press.
-
(2004)
Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS'04)
, pp. 223-228
-
-
Meyerson, A.1
Williams, R.2
-
24
-
-
46649101105
-
Maintaining k-anonymity against incremental updates
-
Washington, DC, USA, IEEE Computer Society
-
J. Pei, J. Xu, Z. Wang, W. Wang, and K. Wang. Maintaining k-anonymity against incremental updates. In Proceedings of the 19th International Conference on Scientific and Statistical Database Management (SSDBM'07), page 5, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the 19th International Conference on Scientific and Statistical Database Management (SSDBM'07)
, pp. 5
-
-
Pei, J.1
Xu, J.2
Wang, Z.3
Wang, W.4
Wang, K.5
-
25
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati. Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6):1010-1027, 2001.
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
27
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Technical Report SRI-CSL-98-04
-
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In Technical Report SRI-CSL-98-04, 1998.
-
(1998)
-
-
Samarati, P.1
Sweeney, L.2
-
29
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 10(5):571-588, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
30
-
-
0036811662
-
-
L. Sweeney. K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 10(5):571-588, 2002.
-
L. Sweeney. K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 10(5):571-588, 2002.
-
-
-
-
31
-
-
0001024505
-
On the uniform convergence of relative frequencies of events to their probabilities
-
V. N. Vapnik and A. Y. Chervonenkis. On the uniform convergence of relative frequencies of events to their probabilities. Theory of Probability and its Applications, 16:264-280, 1971.
-
(1971)
Theory of Probability and its Applications
, vol.16
, pp. 264-280
-
-
Vapnik, V.N.1
Chervonenkis, A.Y.2
-
32
-
-
33749581232
-
Anonymizing sequential releases
-
New York, NY, USA, ACM Press
-
K. Wang and B. C. M. Fung. Anonymizing sequential releases. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD'06), pages 414-423, New York, NY, USA, 2006. ACM Press.
-
(2006)
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD'06)
, pp. 414-423
-
-
Wang, K.1
Fung, B.C.M.2
-
34
-
-
28444438967
-
Using simulated annealing for k-anonymity
-
Technical Report Statistics 2002-7, U.S. Census Bureau, Statistical Research Division
-
W. E. Winkler. Using simulated annealing for k-anonymity. In Technical Report Statistics 2002-7, U.S. Census Bureau, Statistical Research Division, 2002.
-
(2002)
-
-
Winkler, W.E.1
-
35
-
-
34250680246
-
Personalized privacy preservation
-
New York, NY, USA, ACM
-
X. Xiao and Y. Tao. Personalized privacy preservation. In Proceedings of the 2006 A CM SIGMOD international conference on Management of data (SIGMOD'06), pages 229-240, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 2006 A CM SIGMOD international conference on Management of data (SIGMOD'06)
, pp. 229-240
-
-
Xiao, X.1
Tao, Y.2
-
36
-
-
35448967088
-
M-invariance: Towards privacy preserving re-publication of dynamic datasets
-
New York, NY, USA, ACM
-
X. Xiao and Y. Tao. M-invariance: towards privacy preserving re-publication of dynamic datasets. In Proceedings of the 2007 ACM SIGMOD international conference on Management of data (SIGMOD'07), pages 689-700, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2007 ACM SIGMOD international conference on Management of data (SIGMOD'07)
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
37
-
-
33749582207
-
Utility-based anonymization using local recoding
-
New York, NY, USA, ACM Press
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu. Utility-based anonymization using local recoding. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD'06), pages 785-790, New York, NY, USA, 2006. ACM Press.
-
(2006)
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD'06)
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.-C.6
|