-
1
-
-
76749089617
-
-
PhD dissertation, Massachusetts Inst. of Technology
-
T.A. Lasko, "Spectral Anonymization of Data," PhD dissertation, Massachusetts Inst. of Technology, 2007.
-
(2007)
Spectral Anonymization of Data
-
-
Lasko, T.A.1
-
2
-
-
34250017239
-
A face is exposed for AOL searcher No. 4417749
-
Aug.
-
M. Barbaro, T. Zeller, and S. Hansell, "A Face Is Exposed for AOL Searcher No. 4417749," New York Times, http://www.nytimes. com/2006/08/09/technology/09aol.html, Aug. 2006.
-
(2006)
New York Times
-
-
Barbaro, M.1
Zeller, T.2
Hansell, S.3
-
3
-
-
0344971447
-
The confidentiality and analytic usefulness of masked business microdata
-
N. Spruill, "The Confidentiality and Analytic Usefulness of Masked Business Microdata," Proc. Section on Survey Research Methods, pp. 602-607, 1983.
-
(1983)
Proc. Section on Survey Research Methods
, pp. 602-607
-
-
Spruill, N.1
-
4
-
-
84949472056
-
Microdata protection through noise addition
-
Springer
-
R. Brand, "Microdata Protection through Noise Addition," Inference Control in Statistical Databases, pp. 97-116, Springer, 2002.
-
(2002)
Inference Control in Statistical Databases
, pp. 97-116
-
-
Brand, R.1
-
5
-
-
33745547205
-
Towards privacy in public databases
-
Feb.
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee, "Towards Privacy in Public Databases," Proc. Second Theory of Cryptography Conf. (TCC '05), Feb. 2005.
-
(2005)
Proc. Second Theory of Cryptography Conf. (TCC '05)
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
6
-
-
35048813475
-
Data swapping: Variations on a theme by dalenius and reiss
-
Springer
-
S.E. Fienberg and J. McIntyre, "Data Swapping: Variations on a Theme by Dalenius and Reiss," Privacy in Statistical Databases, pp. 14-29, Springer, 2004.
-
(2004)
Privacy in Statistical Databases
, pp. 14-29
-
-
Fienberg, S.E.1
McIntyre, J.2
-
7
-
-
33645384015
-
Evaluating fuzzy clustering algorithms for microdata protection
-
Springer
-
V. Torra and S. Miyamoto, "Evaluating Fuzzy Clustering Algorithms for Microdata Protection," Privacy in Statistical Databases, pp. 175-186, Springer, 2004.
-
(2004)
Privacy in Statistical Databases
, pp. 175-186
-
-
Torra, V.1
Miyamoto, S.2
-
8
-
-
26944448516
-
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
-
Sept.
-
J. Domingo-Ferrer and V. Torra, "Ordinal, Continuous and Heterogeneous k-Anonymity through Microaggregation," Data Mining and Knowledge Discovery, vol.11, no.2, pp. 195-212, Sept. 2005.
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
9
-
-
10144252689
-
Confidentiality issues at the united states bureau of the census
-
L.H. Cox, S. McDonald, and D. Nelson, "Confidentiality Issues at the United States Bureau of the Census," J. Official Statistics, vol.2, no.2, pp. 135-160, 1986.
-
(1986)
J. Official Statistics
, vol.2
, Issue.2
, pp. 135-160
-
-
Cox, L.H.1
McDonald, S.2
Nelson, D.3
-
10
-
-
0001883017
-
Disclosure control of microdata
-
Mar.
-
J.G. Bethlehem, W.J. Keller, and J. Pannekoek, "Disclosure Control of Microdata," J. Am. Statistical Assoc., vol.85, no.409, pp. 38-45, Mar. 1990.
-
(1990)
J. Am. Statistical Assoc.
, vol.85
, Issue.409
, pp. 38-45
-
-
Bethlehem, J.G.1
Keller, W.J.2
Pannekoek, J.3
-
11
-
-
0000185822
-
Statistical analysis of masked data
-
R.J.A. Little, "Statistical Analysis of Masked Data," J. Official Statistics, vol.9, no.2, pp. 407-426, 1993.
-
(1993)
J. Official Statistics
, vol.9
, Issue.2
, pp. 407-426
-
-
Little, R.J.A.1
-
12
-
-
0022130080
-
A data distortion by probability distribution
-
C.K. Liew, U.J. Choi, and C.J. Liew, "A Data Distortion by Probability Distribution," ACM Trans. Database Systems, vol.10, no.3, pp. 395-411, 1985.
-
(1985)
ACM Trans. Database Systems
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.K.1
Choi, U.J.2
Liew, C.J.3
-
13
-
-
0012776989
-
Discussion: Statistical disclosure limitation
-
D.B. Rubin, "Discussion: Statistical Disclosure Limitation," J. Official Statistics, vol.9, no.2, pp. 461-468, 1993.
-
(1993)
J. Official Statistics
, vol.9
, Issue.2
, pp. 461-468
-
-
Rubin, D.B.1
-
14
-
-
84949463843
-
Sensitive micro data protection using latin hypercube sampling technique
-
Springer-Verlag
-
R.A. Dandekar, M. Cohen, and N. Kirkendall, "Sensitive Micro Data Protection Using Latin Hypercube Sampling Technique," Inference Control in Statistical Databases: From Theory to Practice, pp. 117-125, Springer-Verlag, 2002.
-
(2002)
Inference Control in Statistical Databases: From Theory to Practice
, pp. 117-125
-
-
Dandekar, R.A.1
Cohen, M.2
Kirkendall, N.3
-
15
-
-
0348062788
-
Maximum entropy simulation for microdata protection
-
S. Polettini, "Maximum Entropy Simulation for Microdata Protection," Statistics and Computing, vol.13, no.4, pp. 307-320, 2003.
-
(2003)
Statistics and Computing
, vol.13
, Issue.4
, pp. 307-320
-
-
Polettini, S.1
-
16
-
-
0000983892
-
Masking procedures for microdata disclosure limitation
-
W.A. Fuller, "Masking Procedures for Microdata Disclosure Limitation," J. Official Statistics, vol.9, no.2, pp. 383-406, 1993.
-
(1993)
J. Official Statistics
, vol.9
, Issue.2
, pp. 383-406
-
-
Fuller, W.A.1
-
17
-
-
0032656018
-
Correlations and copulas for decision and risk analysis
-
R.T. Clemen and T. Reilly, "Correlations and Copulas for Decision and Risk Analysis," Management Science, vol.45, no.2, pp. 208-224, 1999.
-
(1999)
Management Science
, vol.45
, Issue.2
, pp. 208-224
-
-
Clemen, R.T.1
Reilly, T.2
-
18
-
-
0002956175
-
A method for limiting disclosure in microdata based on random noise and transformation
-
J. Kim, "A Method for Limiting Disclosure in Microdata Based on Random Noise and Transformation," Proc. Section on Survey Research Methods, pp. 370-374, 1986.
-
(1986)
Proc. Section on Survey Research Methods
, pp. 370-374
-
-
Kim, J.1
-
20
-
-
76749139496
-
Predictive disclosure
-
ch. 2.1 Springer
-
L. Willenborg and T. de Waal, "Predictive Disclosure," Elements of Statistical Disclosure Control, vol.155, ch. 2.1, pp. 42-46, Springer, 2001.
-
(2001)
Elements of Statistical Disclosure Control
, vol.155
, pp. 42-46
-
-
Willenborg, L.1
De Waal, T.2
-
21
-
-
76749098876
-
Reidentification risk
-
ch. 2.5 Springer
-
L. Willenborg and T. de Waal, "Reidentification Risk," Elements of Statistical Disclosure Control, vol.155, ch. 2.5, pp. 46-51, Springer, 2001.
-
(2001)
Elements of Statistical Disclosure Control
, vol.155
, pp. 46-51
-
-
Willenborg, L.1
De Waal, T.2
-
22
-
-
0007251183
-
Re-identification methods for evaluating the confidentiality of analytically valid microdata
-
W.E. Winkler, "Re-Identification Methods for Evaluating the Confidentiality of Analytically Valid Microdata," Research in Official Statistics, vol.1, pp. 87-104, 1998.
-
(1998)
Research in Official Statistics
, vol.1
, pp. 87-104
-
-
Winkler, W.E.1
-
23
-
-
4344559647
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
May
-
P. Samarati and L. Sweeney, "Protecting Privacy When Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression," Proc. IEEE Symp. Research in Security and Privacy, May 1998.
-
(1998)
Proc. IEEE Symp. Research in Security and Privacy
-
-
Samarati, P.1
Sweeney, L.2
-
24
-
-
3042797039
-
Privacy: A machine learning view
-
Aug.
-
S.A. Vinterbo, "Privacy: A Machine Learning View," IEEE Trans. Knowledge and Data Eng., vol.16, no.8, pp. 939-948, Aug. 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng.
, vol.16
, Issue.8
, pp. 939-948
-
-
Vinterbo, S.A.1
-
26
-
-
84941871856
-
The kolmogorov-smirnov test for goodness of fit
-
Mar.
-
F.J. Massey, Jr., "The Kolmogorov-Smirnov Test for Goodness of Fit," J. Am. Statistical Assoc., vol.46, no.253, pp. 68-78, Mar. 1951.
-
(1951)
J. Am. Statistical Assoc.
, vol.46
, Issue.253
, pp. 68-78
-
-
Massey Jr., F.J.1
-
27
-
-
0003602382
-
Tests on two independent samples
-
third ed., ch. 6.3, Wiley
-
W.J. Conover, "Tests on Two Independent Samples," Practical Nonparametric Statistics, third ed., ch. 6.3, pp. 456-465, Wiley, 1999.
-
(1999)
Practical Nonparametric Statistics
, pp. 456-465
-
-
Conover, W.J.1
-
28
-
-
0000432739
-
Disclosure limitation using perturbation and related methods for categorical data
-
S.E. Fienberg, E. Makov, and R. Steel, "Disclosure Limitation Using Perturbation and Related Methods for Categorical Data," J. Official Statistics, vol.14, no.4, pp. 485-502, 1998.
-
(1998)
J. Official Statistics
, vol.14
, Issue.4
, pp. 485-502
-
-
Fienberg, S.E.1
Makov, E.2
Steel, R.3
-
30
-
-
84987978538
-
Non-reversible privacy transformations
-
S.P. Reiss, M.J. Post, and T. Dalenius, "Non-Reversible Privacy Transformations," Proc. First ACM SIGACT-SIGMOD Symp. Principles of Database Systems (PODS '82), pp. 139-146, 1982.
-
(1982)
Proc. First ACM SIGACT-SIGMOD Symp. Principles of Database Systems (PODS '82)
, pp. 139-146
-
-
Reiss, S.P.1
Post, M.J.2
Dalenius, T.3
-
31
-
-
33646348083
-
A data-swapping technique using ranks-a method for disclosure control
-
M. Carlson and M. Salabasis, "A Data-Swapping Technique using Ranks-a Method for Disclosure Control," Research in Official Statistics, vol.6, no.2, pp. 35-64, 2002.
-
(2002)
Research in Official Statistics
, vol.6
, Issue.2
, pp. 35-64
-
-
Carlson, M.1
Salabasis, M.2
-
32
-
-
10944249990
-
Controlled data swapping techniques for masking public use data sets
-
Statistical Research Division, US Bureau of the Census
-
R. Moore, "Controlled Data Swapping Techniques for Masking Public Use Data Sets," Report RR96/04, Statistical Research Division, US Bureau of the Census, 1996.
-
(1996)
Report RR96/04
-
-
Moore, R.1
-
33
-
-
33646367179
-
Data shuffling-a new masking approach for numerical data
-
May
-
K. Muralidhar and R. Sarathy, "Data Shuffling-a New Masking Approach for Numerical Data," Management Science, vol.52, no.5, pp. 658-670, May 2006.
-
(2006)
Management Science
, vol.52
, Issue.5
, pp. 658-670
-
-
Muralidhar, K.1
Sarathy, R.2
-
34
-
-
84868174781
-
-
National Health and Examination Survey (NHANES) National Center for Health Statistics (NCHS)
-
"National Health and Examination Survey (NHANES)," National Center for Health Statistics (NCHS), Centers for Disease Control and Prevention (CDC), http://www.cdc.gov/nchs/about/major/ nhanes/datalink.htm, 2009.
-
(2009)
-
-
-
35
-
-
0028393221
-
A modified random perturbation method for database security
-
P. Tendick and N. Matloff, "A Modified Random Perturbation Method for Database Security," ACM Trans. Database Systems, vol.19, no.1, pp. 47-63, 1994.
-
(1994)
ACM Trans. Database Systems
, vol.19
, Issue.1
, pp. 47-63
-
-
Tendick, P.1
Matloff, N.2
-
36
-
-
26044460461
-
The use of receiver operating characteristic curves in biomedical informatics
-
Oct.
-
T.A. Lasko, J.G. Bhagwat, K.H. Zou, and L. Ohno-Machado, "The Use of Receiver Operating Characteristic Curves in Biomedical Informatics," J. Biomedical Informatics, vol.38, no.5, pp. 404-415, http://dx.doi.org/10.1016/j. jbi.2005.02.008, Oct. 2005.
-
(2005)
J. Biomedical Informatics
, vol.38
, Issue.5
, pp. 404-415
-
-
Lasko, T.A.1
Bhagwat, J.G.2
Zou, K.H.3
Ohno-Machado, L.4
-
37
-
-
23844515436
-
Random-data perturbation techniques and privacy-preserving data mining
-
May
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "Random-Data Perturbation Techniques and Privacy-Preserving Data Mining," Knowledge and Information Systems, vol.7, no.4, pp. 387-414, May 2005.
-
(2005)
Knowledge and Information Systems
, vol.7
, Issue.4
, pp. 387-414
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
|