-
1
-
-
85032400475
-
Disclose limitation of sensitive rules
-
ABE+99
-
[ABE+99] M. Atallah, E. Bertino, A. K. Elmagarmid, M. Ibrahim, V. S. Verykios, Disclose Limitation of Sensitive Rules. Knowledge and Data Exchange Workshop 1999.
-
(1999)
Knowledge and Data Exchange Workshop
-
-
Atallah, M.1
Bertino, E.2
Elmagarmid, A.K.3
Ibrahim, M.4
Verykios, V.S.5
-
3
-
-
0041783510
-
Privacy-preserving data mining
-
AS00
-
[AS00] R. Agrawal and R. Srikant, Privacy-Preserving Data Mining, SIGMOD 2000.
-
(2000)
SIGMOD
-
-
Agrawal, R.1
Srikant, R.2
-
5
-
-
27544439829
-
A technique for measuring the relative size and overlap of public web search engines
-
BB98
-
[BB98] K. Bharat and A. Broder. A Technique for Measuring the Relative Size and Overlap of Public Web Search Engines. WWW 1998.
-
(1998)
WWW
-
-
Bharat, K.1
Broder, A.2
-
6
-
-
34250665891
-
Random sampling from a search engine's index
-
BG06
-
[BG06] Z. Bar-Yossef and M. Gurevich. Random Sampling from a Search Engine's Index. WWW 2006.
-
(2006)
WWW
-
-
Bar-Yossef, Z.1
Gurevich, M.2
-
7
-
-
35348840330
-
Efficient search engine measurements
-
[BG07]
-
[BG07] Z. Bar-Yossef and M. Gurevich: Efficient search engine measurements. WWW 2007.
-
(2007)
WWW
-
-
Bar-Yossef, Z.1
Gurevich, M.2
-
8
-
-
0036211203
-
Evaluating Top-k queries over web-accessible databases
-
BGM02
-
[BGM02] N. Bruno, L. Gravano, A. Marian: Evaluating Top-k Queries over Web-Accessible Databases. ICDE 2002.
-
(2002)
ICDE
-
-
Bruno, N.1
Gravano, L.2
Marian, A.3
-
9
-
-
0002104204
-
Query-based sampling of text databases
-
CC01
-
[CC01] J. P. Callan, M. E. Connell: Query-based sampling of text databases. ACM Trans. Inf. Syst. 19(2): 2001.
-
(2001)
ACM Trans. Inf. Syst.
, vol.19
, Issue.2
-
-
Callan, J.P.1
Connell, M.E.2
-
10
-
-
0036372482
-
Minimal probing: supporting expensive predicates for top-k queries
-
CH02
-
[CH02] K. C-C. Chang, S. Hwang: Minimal probing: supporting expensive predicates for top-k queries. SIGMOD 2002.
-
(2002)
SIGMOD
-
-
Chang, K.C.-C.1
Hwang, S.2
-
11
-
-
84859197607
-
WebTables: Exploring the power of tables on the web
-
CHW+08
-
[CHW+08] M. J. Cafarella, A. Halevy, D. Z. Wang, E. Wu, and Y. Zhang, WebTables: Exploring the Power of Tables on the Web, VLDB 2008.
-
(2008)
VLDB
-
-
Cafarella, M.J.1
Halevy, A.2
Wang, D.Z.3
Wu, E.4
Zhang, Y.5
-
12
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
[CKV+03]
-
[CKV+03] C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Zhu, Tools for Privacy Preserving Distributed Data Mining, ACM SIGKDD Explorations, 4(28): 2003.
-
(2003)
ACM SIGKDD Explorations
, vol.4
, Issue.28
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.5
-
13
-
-
35448942785
-
H. Mannila: A random walk approach to sampling hidden databases
-
DDM07
-
[DDM07] A. Dasgupta, G. Das, H. Mannila: A random walk approach to sampling hidden databases. SIGMOD 2007.
-
(2007)
SIGMOD
-
-
Dasgupta, A.1
Das, G.2
-
15
-
-
67649671784
-
Leveraging COUNT Information in Sampling Hidden Databases
-
DZD09
-
[DZD09] A. Dasgupta, N. Zhang, G. Das: Leveraging COUNT Information in Sampling Hidden Databases. ICDE 2009.
-
(2009)
ICDE
-
-
Dasgupta, A.1
Zhang, N.2
Das, G.3
-
16
-
-
70849090593
-
On privacy preservations of aggregates in hidden databases
-
[DZDC08]George Washington University
-
[DZDC08] A. Dasgupta, N. Zhang, G. Das, S. Chaudhuri, On Privacy Preservations of Aggregates in Hidden Databases, Technical Report TR-GWU-CS-09-001, George Washington University, 2009.
-
(2009)
Technical Report TR-GWU-CS-09-001
-
-
Dasgupta, A.1
Zhang, N.2
Das, G.3
Chaudhuri, S.4
-
17
-
-
77952329367
-
Asirra: A CAPTCHA that exploits interest-aligned manual image categorization
-
EDHS07
-
[EDHS07] J. Elson, J. R. Douceur, J. Howell, J. Saul: Asirra: a CAPTCHA that exploits interest-aligned manual image categorization, CCS 2007.
-
(2007)
CCS
-
-
Elson, J.1
Douceur, J.R.2
Howell, J.3
Saul, J.4
-
18
-
-
84869689754
-
-
Google08
-
[Google08] http://code.google.com/apis/soapsearch/apifaq.html
-
-
-
-
20
-
-
4644256188
-
-
[HB99]. Irvine, CA: University of California, Department of Information and Computer Science
-
[HB99] S. Hettich and S. D. Bay, The UCI KDD Archive [http://kdd.ics.uci. edu]. Irvine, CA: University of California, Department of Information and Computer Science. 1999.
-
(1999)
Archive The UCI KDD Archive
-
-
Hettich, S.1
Bay, S.D.2
-
21
-
-
18744389475
-
M. Sanderson: A two-phase sampling technique for information extraction from hidden web databases
-
HYJS04
-
[HYJS04] Y. Hedley, M. Younas, A. E. James, M. Sanderson: A two-phase sampling technique for information extraction from hidden web databases. WIDM 2004.
-
(2004)
WIDM
-
-
Hedley, Y.1
Younas, M.2
James, A.E.3
-
22
-
-
33748195920
-
Sampling, information extraction and summarisation of Hidden Web databases
-
HYJS06
-
[HYJS06] Y. Hedley, M. Younas, A. E. James, M. Sanderson: Sampling, information extraction and summarisation of Hidden Web databases. Data Knowl. Eng. 59(2): 2006.
-
(2006)
Data Knowl. Eng.
, vol.59
, Issue.2
-
-
Hedley, Y.1
Younas, M.2
James, A.E.3
Sanderson, M.4
-
23
-
-
2442626107
-
Distributed Search over the Hidden Web: Hierarchical Database Sampling and Selection
-
IG02
-
[IG02] P. G. Ipeirotis, L. Gravano: Distributed Search over the Hidden Web: Hierarchical Database Sampling and Selection. VLDB 2002.
-
(2002)
VLDB
-
-
Ipeirotis, P.G.1
Gravano, L.2
-
24
-
-
0001619596
-
Flexible support for multiple access control policies
-
JSSS01
-
[JSSS01] S. Jajodia, P. Samarati, M. L. Sapino, V. S. Subrahmanian, Flexible support for multiple access control policies. TODS 26(2): 2001.
-
(2001)
TODS
, vol.26
, Issue.2
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
26
-
-
34248181923
-
L-Diversity: Privacy Beyond k- Anonymity
-
MKGV07
-
[MKGV07] A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, l-Diversity: Privacy Beyond k- Anonymity. TKDD 1(1): 2007.
-
(2007)
TKDD
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
27
-
-
84867132157
-
Google's deep-web crawl
-
MKK+08
-
[MKK+08] J. Madhavan, D. Ko, Ł. Kot, V. Ganapathy, A. Rasmussen, and A. Halevy, Google's Deep-Web Crawl, VLDB 2008.
-
(2008)
VLDB
-
-
Madhavan, J.1
Ko, D.2
Kot, L.3
Ganapathy, V.4
Rasmussen, A.5
Halevy, A.6
-
28
-
-
84862604885
-
Towards robustness in query auditing
-
NMK+06
-
[NMK+06] S. U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani, Towards robustness in query auditing. VLDB 2006.
-
(2006)
VLDB
-
-
Nabar, S.U.1
Marthi, B.2
Kenthapadi, K.3
Mishra, N.4
Motwani, R.5
-
29
-
-
0030086382
-
Role-based access control models
-
SCF+96
-
[SCF+96] R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models. IEEE Computer, 29(2): 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
30
-
-
0036811662
-
K-anonymity: A model for protecting privacy. International Journal on Uncertainty
-
Swe02
-
[Swe02] L. Sweeney, k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledgebased Systems, 10(5): 2002.
-
(2002)
Fuzziness and Knowledgebased Systems
, vol.10
, Issue.5
-
-
Sweeney, L.1
-
31
-
-
2142754478
-
Association rule hiding
-
VEB+04
-
[VEB+04] V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni, Association rule hiding, TKDE 16(4): 2004.
-
(2004)
TKDE
, vol.16
, Issue.4
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
-
32
-
-
34247555884
-
Privacy-Preserving Data Mining Systems
-
ZZ07
-
[ZZ07] N. Zhang and W. Zhao, Privacy-Preserving Data Mining Systems. IEEE Computer, 40(4): 2007.
-
(2007)
IEEE Computer
, vol.40
, Issue.4
-
-
Zhang, N.1
Zhao, W.2
|