-
4
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and 1-Diversity
-
N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-anonymity and 1-Diversity", In Proc. of ICDE, 2007, pp. 106-115.
-
(2007)
In Proc. of ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
5
-
-
84859177489
-
Privacy preserving Anonymization of Set valued Data
-
Manolis Terrovitis, Nikos Mamoulis, "Privacy preserving Anonymization of Set valued Data", In VLDB, 2008, pp. 115-125.
-
(2008)
In VLDB
, pp. 115-125
-
-
Terrovitis, M.1
Mamoulis, N.2
-
6
-
-
33749571958
-
(α, k)-Anonymity: An enhaned k-anonymity model for privacy-preserving data publishing
-
ACM Press, New York
-
WONG R C, LI J, FU A W, et al, "(α, k)-Anonymity : an enhaned k-anonymity model for privacy-preserving data publishing", Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM Press, New York, 2006, pp. 754-759.
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 754-759
-
-
Wong, R.C.1
Li, J.2
Fu, A.W.3
-
7
-
-
84990966245
-
Privacy protectio: P-Sensitive k-anonymity property
-
TRUTA T M , VINAY B, "Privacy protectio: p-Sensitive k-anonymity property," Proceedings of the 22nd on Data Engineering Workshops, IEEE Computer Society, Washington Dc, 2006.
-
(2006)
Proceedings of the 22nd on Data Engineering Workshops, IEEE Computer Society, Washington Dc
-
-
Truta, T.M.1
Vinay, B.2
-
8
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
April
-
Qing Zhang, Koundas N, et al, "Aggregate query answering on anonymized tables", In Proc. of ICDE, April, 2007, pp. 116-125.
-
(2007)
In Proc. of ICDE
, pp. 116-125
-
-
Zhang, Q.1
Koundas, N.2
-
9
-
-
35448967088
-
M-invariance: Towards privacy preserving republication of dynamic datasets
-
ACM Press, New York
-
Xiao X, Tao Y, "M-invariance: towards privacy preserving republication of dynamic datasets", In Proc. of SIGMOD, ACM Press, New York, 2007, pp. 689-700.
-
(2007)
In Proc. of SIGMOD
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
10
-
-
84856530175
-
Privacy Preserving Serial Data Publishing by Role Composition
-
Yingyi Bu, Ada Wai-Chee Fu,et al., "Privacy Preserving Serial Data Publishing By Role Composition", In VLDB, 2008, pp. 845-856.
-
(2008)
In VLDB
, pp. 845-856
-
-
Bu, Y.1
Fu, A.W.-C.2
-
13
-
-
33749606641
-
Mondrian multidimensional K-anonymity
-
Atlanta, GA, USA, April.
-
LeFevre K, DeWitt D J, Ramakrishnan R, "Mondrian multidimensional K-anonymity", In Proc of the International Conference on Data Engineering(ICDE'06), Atlanta, GA, USA, April.2006, pp. 25-35.
-
(2006)
In Proc of the International Conference on Data Engineering(ICDE'06)
, pp. 25-35
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
14
-
-
54049130055
-
A Multi-Dimensional. K-Anonymity Model for Hierarchical Data
-
Aug.
-
Xiaojun Ye, Jin, L, Bin. Li, "A Multi-Dimensional. K-Anonymity Model for Hierarchical Data", Electronic Commerce and Security, 2008 International Symposium, Aug. 2008, pp. 327-332.
-
(2008)
Electronic Commerce and Security, 2008 International Symposium
, pp. 327-332
-
-
Ye, X.1
Jin, L.2
Li, Bin.3
-
15
-
-
27144536001
-
Extensions to the k-means algorithm for clustering large data sets with categorical values
-
Z. Huang, "Extensions to the k-means algorithm for clustering large data sets with categorical values", Data Mining and Knowledge Discovery, 1998, pp. 283-304.
-
(1998)
Data Mining and Knowledge Discovery
, pp. 283-304
-
-
Huang, Z.1
-
16
-
-
38049126170
-
Efficient k-Anonymization Using Clustering Techniques
-
Berli: Spring-Verlag, April.
-
Ji-Won Byun, Ashish Kamra, et al., "Efficient k-Anonymization Using Clustering Techniques", In Internal Conference on Database Systems for Advanced Applications (DASFAA), Berli: Spring-Verlag, April. 2007, pp. 188-200.
-
(2007)
In Internal Conference on Database Systems for Advanced Applications (DASFAA)
, pp. 188-200
-
-
Byun, J.-W.1
Kamra, A.2
-
17
-
-
34250661905
-
Achieving Anonymity via Clustering
-
Chicago, Illinois.
-
G. Aggarwal, T. Feder, et al., "Achieving Anonymity via Clustering",Twenty Fifth, ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS. Chicago, Illinois. 2006.
-
(2006)
Twenty Fifth, ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS.
-
-
Aggarwal, G.1
Feder, T.2
-
18
-
-
14244260513
-
Privacy Preserving Clustering by Data Transformation
-
Manaus, Brazil, October 6-10
-
Stanley R. M. Oliveira, Osmar R. Zaiane, "Privacy Preserving Clustering By Data Transformation", In Proc. of the 18th Brazilian Symposium on Databases (SBBD), Manaus, Brazil, October 6-10, 2003, pp. 304-318.
-
(2003)
In Proc. of the 18th Brazilian Symposium on Databases (SBBD)
, pp. 304-318
-
-
Stanley, R.1
Oliveira, M.2
Zaiane, O.R.3
-
20
-
-
1642374941
-
Analysis of privacy preserving random, perturbation techniques: Further explorations
-
Washington, DC, Oct.
-
Haimonti Dutta, Hillol Kargupta, et al., "Analysis of privacy preserving random, perturbation techniques: further explorations", Proceedings of the 2003 ACM workshop on Privacy in the electronic society, Washington, DC, Oct. 2003, pp. 31-38.
-
(2003)
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society
, pp. 31-38
-
-
Dutta, H.1
Kargupta, H.2
-
22
-
-
23844515436
-
Random-data perturbation techniques and privacy-preserving data mining
-
DOI 10.1007/s10115-004-0173-6
-
[22] Hillol Kargupta, Souptik Datta, Qi Wang, et al, "Random-data perturbation techniques and privacy-preserving data mining", Knowledge and Information Systems, May. 2005, pp. 387-414. (Pubitemid 41166792)
-
(2005)
Knowledge and Information Systems
, vol.7
, Issue.4
, pp. 387-414
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
23
-
-
70449428830
-
Survey of research on anonymilization technology in data publication
-
Liu Yu, Dap eng L, et al., "Survey of research on anonymilization technology in data publication", Computer Application, pp. 2361-2364.
-
Computer Application
, pp. 2361-2364
-
-
Yu, L.1
Dap Eng, L.2
-
24
-
-
29844458622
-
Deriving private information from randomized data
-
Jun.
-
Zhengli Huang, Wenliang Du, and Biao Chen, "Deriving private information from randomized data", In Proc. of SIGMOD, Jun. 2005, pp.37-48.
-
(2005)
In Proc. of SIGMOD
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
25
-
-
49049096374
-
A New Scheme for Distributed Density Estimation based Privacy-Preserving
-
Third International Conference on 4-7 March
-
Chunhua Su, Feng Bao, et al., "A New Scheme for Distributed Density Estimation based Privacy-Preserving", Clustering, Availability, Reliability and Security, ARES 08, Third International Conference on 4-7 March 2008, pp. 112-119.
-
(2008)
Clustering, Availability, Reliability and Security, ARES 08
, pp. 112-119
-
-
Su, C.1
Bao, F.2
-
26
-
-
70449395944
-
Structural Signatures for Tree Data Structures
-
Ashish Kundu, Elisa Bertino, "Structural Signatures for Tree Data Structures", In VLDB 2008, pp. 138-150.
-
(2008)
In VLDB
, pp. 138-150
-
-
Kundu, A.1
Bertino, E.2
|