-
2
-
-
0242674432
-
Hippocratic databases
-
AGRAWAL, R., KIERNAN, J., SRIKANT, R., AND XU, Y. 2002. Hippocratic databases. In Proceedings of the Very Large Data Bases. 143-154.
-
(2002)
Proceedings of the Very Large Data Bases
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
3142716056
-
Order preserving encryption for numeric data
-
AGRAWAL, R.,KIERNAN, J., SRIKANT, R., AND XU, Y. 2004a. Order preserving encryption for numeric data. In Proceedings of the ACM International Conference on Management of Data. 563-574.
-
(2004)
Proceedings of the ACM International Conference on Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
7
-
-
84959049489
-
An efficient and practical scheme for privacy protection in e-commerce of digital goods
-
BAO, F., DENG, R. H., AND FENG, P. 2000. An efficient and practical scheme for privacy protection in e-commerce of digital goods. In Proceedings of the 3rd International Conference on Information Security and Cryptology, 2015, 162-170.
-
(2000)
Proceedings of the 3rd International Conference on Information Security and Cryptology
, vol.2015
, pp. 162-170
-
-
Bao, F.1
Deng, R.H.2
Feng, P.3
-
8
-
-
34250013678
-
A face is exposed for AOL searcher No. 4417749
-
BARBARO, M. AND ZELLER, T. 2006. A face is exposed for AOL searcher No. 4417749. The New York Times. http://www.nytimes.com/2006/08/09/technology/09aol. html.
-
(2006)
The New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
12
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
BLOOM, B. 1970. Space/time trade-offs in hash coding with allowable errors. Comm. ACM 13, 7, 422-426.
-
(1970)
Comm. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
13
-
-
0041619493
-
A systematic appproach to compressing a full text retrieval system
-
BOOKSTEIN, A., KLEIN, S. T., AND ZIFF, D. 1992. A systematic appproach to compressing a full text retrieval system. Inform. Process. Manage. 28, 6, 795-806.
-
(1992)
Inform. Process. Manage.
, vol.28
, Issue.6
, pp. 795-806
-
-
Bookstein, A.1
Klein, S.T.2
Ziff, D.3
-
14
-
-
0038589165
-
The anatomy of a large-scale hypertextual web search engine
-
BRIN, S. AND PAGE, L. 1998. The anatomy of a large-scale hypertextual web search engine. Comput. Netw. ISDN Syst. 30, 1-7, 107-117.
-
(1998)
Comput. Netw. ISDN Syst.
, vol.30
, Issue.1-7
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
15
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
CHAUM, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Commu. ACM 24, 2, 84-90.
-
(1981)
Commu. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
16
-
-
0029541045
-
Private information retrieval
-
CHOR, B., GOLDREICH, O., KUSHILEVITZ, E., AND SUDAN, M. 1995. Private information retrieval. In Proceedings of the IEEE Symposium on Foundations of Computer Science. 41-50.
-
(1995)
Proceedings of the IEEE Symposium on Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
17
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSS
-
DAMIANI, E., VIMERCATI, S. D. C., JAJODIA, S., PARABOSCHI, S., AND SAMARATI, P. 2003. Balancing confidentiality and efficiency in untrusted relational DBMSS. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). 93-102.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
18
-
-
84989525001
-
Indexing by latent semantic analysis
-
DEERWESTER, S., DUMAIS, S. T., FURNAS, G. W., LANDAUER, T. K., AND HARSHMAN, R. 1990. Indexing by latent semantic analysis. J. Am. Soc. Inform. Sci. 41, 6, 391-407.
-
(1990)
J. Am. Soc. Inform. Sci.
, vol.41
, Issue.6
, pp. 391-407
-
-
Deerwester, S.1
Dumais, S.T.2
Furnas, G.W.3
Landauer, T.K.4
Harshman, R.5
-
20
-
-
35048834229
-
On the security of noise addition for privacy in statistical databases
-
DOMINGO-FERRER, J., SEB́E, F., AND CASTELL-ROCA, J. 2004. On the security of noise addition for privacy in statistical databases. In Privacy in Statistical Databases, 149-161.
-
(2004)
Privacy in Statistical Databases
, pp. 149-161
-
-
Domingo-Ferrer, J.1
Seb́e, F.2
Castell-Roca, J.3
-
21
-
-
52049126397
-
Privacy homomorphisms for social networks with private relationships
-
DOMINGO-FERRER, J., VIEJO, A., SEB́E, F., AND GONŹALEZ- NICOĹAS, U. 2008. Privacy homomorphisms for social networks with private relationships. Comput. Netw. 52, 3007-3016.
-
(2008)
Comput. Netw.
, vol.52
, pp. 3007-3016
-
-
Domingo-Ferrer, J.1
Viejo, A.2
Seb́e, F.3
Gonźalez-Nicoĺas, U.4
-
22
-
-
33751075906
-
Fast Monte Carlo algorithms for matrices II: Computing a low-rank approximation to a matrix
-
DOI 10.1137/S0097539704442696
-
DRINEAS, P., KANNAN, R., AND MAHONEY, M. W. 2006. Fast Monte Carlo algorithms for matrices II: Computing a low-rank approximation to a matrix. SIAM J. Comput. 36, 1, 158-183. (Pubitemid 46374022)
-
(2006)
SIAM Journal on Computing
, vol.36
, Issue.1
, pp. 158-183
-
-
Drineas, P.1
Kannan, R.2
Mahoney, M.W.3
-
23
-
-
0002698154
-
Latent semantic indexing (LSI) and TREC-2
-
D. Harman, Ed. National Institute of Standards and Technology Special Publication
-
DUMAIS, S. T. 1994. Latent Semantic Indexing (LSI) and TREC-2. In Proceedings of the 2nd Text REtrieval Conference (TREC2). D. Harman, Ed. National Institute of Standards and Technology Special Publication, 105-116.
-
(1994)
Proceedings of the 2nd Text REtrieval Conference (TREC2)
, pp. 105-116
-
-
Dumais, S.T.1
-
24
-
-
0010295388
-
Latent semantic indexing (LSI): TREC-3 report
-
D. Harman, ed National Institute of Standards and Technology Special Publication
-
DUMAIS, S. T. 1995. Latent semantic indexing (LSI): TREC-3 report, D. Harman, ed. In Proceedings of the 3rd Text REtrieval Conference (TREC3). National Institute of Standards and Technology Special Publication, 219-230.
-
(1995)
Proceedings of the 3rd Text REtrieval Conference (TREC3)
, pp. 219-230
-
-
Dumais, S.T.1
-
25
-
-
0001751897
-
Disclosure limitationmethods and information loss for tabular data
-
P. Doyle, J. Lane, J. Theeuwes, and L. Zayatz, Eds. Elsevier
-
DUNCAN, G. T., FIENBERG, S. E., KRISHNAN, R., PADMAN, R., AND ROEHRIG, S. F. 2001. Disclosure limitationmethods and information loss for tabular data. In Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, P. Doyle, J. Lane, J. Theeuwes, and L. Zayatz, Eds. Elsevier, 135-166.
-
(2001)
Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies
, pp. 135-166
-
-
Duncan, G.T.1
Fienberg, S.E.2
Krishnan, R.3
Padman, R.4
Roehrig, S.F.5
-
26
-
-
0000534667
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ELGAMAL, T. 1984. A public-key cryptosystem and a signature scheme based on discrete logarithms. In Proceedings of the Crypto. 10-18.
-
(1984)
Proceedings of the Crypto
, pp. 10-18
-
-
Elgamal, T.1
-
27
-
-
70449378087
-
Efficient computation of the Riemannian SVD in TLS problems in information retrieval
-
S. van Huffel and P. Lemmerling, Eds. Kluwer Academic Publishers
-
FIERRO, R. AND BERRY, M. 2002. Efficient computation of the Riemannian SVD in TLS problems in information retrieval. In Total Least Squares and Errors-In-Variables Modeling: Analysis, Algorithms, and Applications, S. van Huffel and P. Lemmerling, Eds. Kluwer Academic Publishers, 349-360.
-
(2002)
Total Least Squares and Errors-In-Variables Modeling: Analysis, Algorithms, and Applications
, pp. 349-360
-
-
Fierro, R.1
Berry, M.2
-
28
-
-
33745161240
-
Keyword search and oblivious pseudorandom functions
-
FREEDMAN, M. J., ISHAI, Y., PINKAS, B., AND REINGOLD, O. 2005. Keyword search and oblivious pseudorandom functions. In Proceedings of the 2nd Theory of Cryptography Conference.
-
(2005)
Proceedings of the 2nd Theory of Cryptography Conference
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
29
-
-
77957175435
-
Probabilistic models in information retrieval
-
FUHR, N. 1992. Probabilistic models in information retrieval. Comput. J. 35, 3, 243-255.
-
(1992)
Comput. J.
, vol.35
, Issue.3
, pp. 243-255
-
-
Fuhr, N.1
-
31
-
-
0005063385
-
Onion routing
-
GOLDSCHLAG, D., REED, M., AND SYVERSON, P. 1999. Onion routing. Comm. ACM 42, 2, 39-41.
-
(1999)
Comm. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
32
-
-
0036563104
-
Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases
-
GOPAL, R., GARFINKEL, R., AND GOES, P. 2002. Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases. Oper. Reser. 50, 3, 501-516.
-
(2002)
Oper. Reser.
, vol.50
, Issue.3
, pp. 501-516
-
-
Gopal, R.1
Garfinkel, R.2
Goes, P.3
-
35
-
-
0036361105
-
Executing SQL over encrypted data in the database service provider model
-
HACIGUMUS, H., IYER, B., LI, C., AND MEHROTRA, S. 2002. Executing SQL over encrypted data in the database service provider model. In Proceedings of the ACM International Conference on Management of Data. 216-227.
-
(2002)
Proceedings of the ACM International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
36
-
-
67650867547
-
Marketers trace paths users leave on internet
-
HANSELL, S. 2006. Marketers trace paths users leave on internet. The New York Times. http://www.nytimes.com/2006/08/15/technology/15search.html.
-
(2006)
The New York Times
-
-
Hansell, S.1
-
37
-
-
8644230223
-
Locality preserving indexing for document representation
-
HE, X.,CAI, D., LIU, H., AND MA,W.-Y. 2004. Locality preserving indexing for document representation. In Proceedings of the ACMSIGIR Conference on Research and Development in Information Retrieval, 96-103.
-
(2004)
Proceedings of the ACMSIGIR Conference on Research and Development in Information Retrieval
, pp. 96-103
-
-
He, X.1
Cai, D.2
Liu, H.3
Ma, W.-Y.4
-
38
-
-
0000701994
-
Distance browsing in spatial databases
-
HJALTASON, G. R. AND SAMET, H. 1999. Distance browsing in spatial databases. ACM Trans. on Datab. Syst. 24, 2, 265-318.
-
(1999)
ACM Trans. on Datab. Syst.
, vol.24
, Issue.2
, pp. 265-318
-
-
Hjaltason, G.R.1
Samet, H.2
-
41
-
-
0001619596
-
Flexible support for multiple access control policies
-
DOI 10.1145/383891.383894
-
JAJODIA, S.,SAMARATI, P.,SAPINO,M. L., AND SUBRAHMANIAN, V. S. 2001. Flexible support formultiple access control policies. ACM Trans. Datab. Syst. 26, 2, 214-260. (Pubitemid 33661632)
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
42
-
-
52649171325
-
Similar document detection with limited information disclosure
-
JIANG, W.,MURUGESAN, M., CLIFTON, C., AND SI, L. 2008. Similar document detection with limited information disclosure. In Proceedings of the IEEE International Conference on Data Engineering. 735-743.
-
(2008)
Proceedings of the IEEE International Conference on Data Engineering
, pp. 735-743
-
-
Jiang, W.1
Murugesan, M.2
Clifton, C.3
Si, L.4
-
43
-
-
33749672242
-
A data disclosure policy for count data based on the COM-Poisson distribution
-
KADANE, J. B., KRISHNAN, R., AND SHMUELI, G. 2006. A data disclosure policy for count data based on the COM-Poisson distribution. Manag. Sci. 52, 10, 1610-1617.
-
(2006)
Manag. Sci.
, vol.52
, Issue.10
, pp. 1610-1617
-
-
Kadane, J.B.1
Krishnan, R.2
Shmueli, G.3
-
44
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
KALNIS, P.,GHINITA, G.,MOURATIDIS, K., AND PAPADIAS, D. 2007. Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Engin. 19, 12, 1719-1733.
-
(2007)
IEEE Trans. Knowl. Data Engin.
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
45
-
-
0002956175
-
A method for limiting disclosure in microdata based on random noise and transformation
-
American Statistical Association
-
KIM, J. 1986. A method for limiting disclosure in microdata based on random noise and transformation. In Section on Survey Research Methods, American Statistical Association, 303-308.
-
(1986)
Section on Survey Research Methods
, pp. 303-308
-
-
Kim, J.1
-
46
-
-
0024690043
-
Storing text retrieval systems on CD-ROM. Compression and encryption considerations
-
KLEIN, S. T., BOOKSTEIN, A., AND DEERWESTER, S. C. 1989. Storing text retrieval systems on CDROM: Compression and encryption considerations. ACM Trans. Inform. Syst. 7, 3, 230-245. (Pubitemid 21659998)
-
(1989)
ACM transactions on office information systems
, vol.7
, Issue.3
, pp. 230-245
-
-
Klein Shmuel, T.1
Bookstein Abraham2
Deerwester Scott3
-
47
-
-
4243148480
-
Authoritative sources in a hyperlinked environment
-
KLEINBERG, J. M. 1999. Authoritative sources in a hyperlinked environment. J. ACM 46, 5, 604-632.
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 604-632
-
-
Kleinberg, J.M.1
-
48
-
-
0032183760
-
A semidiscrete matrix decomposition for latent semantic indexing information retrieval
-
KOLDA, T. G. AND O'LEARY, D. P. 1998. A semidiscrete matrix decomposition for latent semantic indexing information retrieval. ACM Trans. Inform. Syst. 16, 4, 322-346.
-
(1998)
ACM Trans. Inform. Syst.
, vol.16
, Issue.4
, pp. 322-346
-
-
Kolda, T.G.1
O'Leary, D.P.2
-
49
-
-
1942420748
-
Oblivious keyword search
-
KUROSAWA, K. AND OGATA, W. 2004. Oblivious keyword search. J. Complex. 20, 2-3, 356-371.
-
(2004)
J. Complex.
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Kurosawa, K.1
Ogata, W.2
-
50
-
-
84876811202
-
RCV1: A new benchmark collection for text categorization research
-
LEWIS, D. D., YANG, Y., ROSE, T. G., AND LI, F. 2004. RCV1: A new benchmark collection for text categorization research. J. Mach. Learn. Resea. 5, 361-397.
-
(2004)
J. Mach. Learn. Resea
, vol.5
, pp. 361-397
-
-
Lewis, D.D.1
Yang, Y.2
Rose, T.G.3
Li, F.4
-
52
-
-
33749607006
-
L-Diversity: Privacy beyond K-anonymity
-
MACHANAVAJJHALA, A., GEHRKE, J., KIFER, D., AND VENKITASUBRAMANIAM, M. 2006. L-Diversity: Privacy beyond K-anonymity. In Proceedings of the IEEE International Conference on Data Engineering. 24-35.
-
(2006)
Proceedings of the IEEE International Conference on Data Engineering
, pp. 24-35
-
-
MacHanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
53
-
-
33847045247
-
Minimizing information loss and preserving privacy
-
MENON, S. AND SARKAR, S. 2007. Minimizing information loss and preserving privacy. Manag. Sci. 53, 1, 101-116.
-
(2007)
Manag. Sci.
, vol.53
, Issue.1
, pp. 101-116
-
-
Menon, S.1
Sarkar, S.2
-
55
-
-
36749033301
-
Private searching on streaming data
-
OSTROVSKY, R. AND SKEITH, W. E. 2007. Private searching on streaming data. J. Cryptol. 20, 4, 397-430.
-
(2007)
J. Cryptol.
, vol.20
, Issue.4
, pp. 397-430
-
-
Ostrovsky, R.1
Skeith, W.E.2
-
57
-
-
3042643368
-
Steganographic schemes for file system and B-tree
-
PANG, H., TAN, K.-L., AND ZHOU, X. 2004. Steganographic schemes for file system and B-tree. IEEE Trans. Knowl. Data Engin. 16, 6, 701-713.
-
(2004)
IEEE Trans. Knowl. Data Engin.
, vol.16
, Issue.6
, pp. 701-713
-
-
Pang, H.1
Tan, K.-L.2
Zhou, X.3
-
60
-
-
70350000160
-
Latent semantic indexing: An overview
-
Spring Paper, University of California, Berkeley.
-
ROSARIO, B. 2000. Latent semantic indexing: An overview. Techn. rep. INFOSYS 240 Spring Paper, University of California, Berkeley. http://www.sims.berkeley.edu/ rosario/projects/LSI.pdf.
-
(2000)
Techn. Rep. INFOSYS 240
-
-
Rosario, B.1
-
62
-
-
0000417994
-
Developments in automatic text retrieval
-
SALTON, G. 1991. Developments in automatic text retrieval. Sci. 253, 5023, 974-979.
-
(1991)
Sci.
, vol.253
, Issue.5023
, pp. 974-979
-
-
Salton, G.1
-
63
-
-
0035517699
-
Protecting respondents' Identities in microdata release
-
SAMARATI, P. 2001. Protecting respondents' Identities in microdata release. IEEE Trans. Knowl. Data Engin. 13, 6, 1010-1027.
-
(2001)
IEEE Trans. Knowl. Data Engin.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
64
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2, 38-47.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
65
-
-
58349110852
-
Privacy protection in personalized search
-
SHEN, X., TAN, B., AND ZHAI, C. 2007. Privacy protection in personalized search. ACM SIGIR Forum 41, 1, 4-17.
-
(2007)
ACM SIGIR Forum
, vol.41
, Issue.1
, pp. 4-17
-
-
Shen, X.1
Tan, B.2
Zhai, C.3
-
67
-
-
0036811662
-
K-Anonymity: A model for protecting privacy
-
SWEENEY, L. 2002. k-Anonymity: A model for protecting privacy. Int. J. Uncertain., Fuzz. Knowl.-Based Syst. 10, 5, 557-570.
-
(2002)
Int. J. Uncertain. Fuzz. Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
68
-
-
0023014685
-
A non-classical logic for information retrieval
-
VAN RIJSBERGEN, C. 1986. A non-classical logic for information retrieval. Comput. J. 29, 6, 481-485.
-
(1986)
Comput. J.
, vol.29
, Issue.6
, pp. 481-485
-
-
Van Rijsbergen, C.1
-
70
-
-
33750984193
-
Minimum-cost network hardening using attack graphs
-
DOI 10.1016/j.comcom.2006.06.018, PII S0140366406002271
-
WANG, L.,NOEL, S., AND JAJODIA, S. 2006. Minimum-cost network hardening using attack graphs. Comput. Commun. 29, 18, 3812-3824. (Pubitemid 44751132)
-
(2006)
Computer Communications
, vol.29
, Issue.18
, pp. 3812-3824
-
-
Wang, L.1
Noel, S.2
Jajodia, S.3
-
71
-
-
33750268079
-
Private information retrieval using trusted hardware
-
WANG, S., DING, X., DENG, R. H., AND BAO, F. 2007. Private information retrieval using trusted hardware. In Proceedings of the European Symposium on Research in Computer Security (ESORICS). 49-64.
-
(2007)
Proceedings of the European Symposium on Research in Computer Security (ESORICS)
, pp. 49-64
-
-
Wang, S.1
Ding, X.2
Deng, R.H.3
Bao, F.4
-
73
-
-
39749203739
-
Augmenting the power of LSI in text retrieval: Singular value rescaling
-
YAN, H., GROSKY, W. I., AND FOTOUHI, F. 2008. Augmenting the power of LSI in text retrieval: Singular value rescaling. Data Knowl. Engin. 65, 1, 108-125.
-
(2008)
Data Knowl. Engin.
, vol.65
, Issue.1
, pp. 108-125
-
-
Yan, H.1
Grosky, W.I.2
Fotouhi, F.3
-
75
-
-
0029359786
-
Adding compression to a full-text retrieval system
-
ZOBEL, J. AND MOFFAT, A. 1995. Adding compression to a full-text retrieval system. Softw.-Practice Exper. 25, 8, 891-903.
-
(1995)
Softw.-Practice Exper.
, vol.25
, Issue.8
, pp. 891-903
-
-
Zobel, J.1
Moffat, A.2
-
76
-
-
33747729581
-
Inverted files for text search engine
-
ZOBEL, J. AND MOFFAT, A. 2006. Inverted files for text search engine. ACM Comput. Surv. 38, 2, 6.
-
(2006)
ACM Comput. Surv.
, vol.38
, Issue.2
, pp. 6
-
-
Zobel, J.1
Moffat, A.2
|