-
1
-
-
26944448516
-
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
-
Domingo-Ferrer J., and Torra V. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining and Knowledge Discovery 11 (2005) 195-212
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
2
-
-
66249085387
-
Information disclosure under realistic assumptions: Privacy versus optimality
-
Alexandria, USA
-
L. Zhang, S. Jajodia, A. Brodsky, Information disclosure under realistic assumptions: privacy versus optimality, in: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, USA, 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
-
-
Zhang, L.1
Jajodia, S.2
Brodsky, A.3
-
3
-
-
41849123637
-
Utility-based anonymization for privacy preservation with less information loss
-
Xu J., Wang W., Pei J., Wang X., Shi B., and Fu A.W. Utility-based anonymization for privacy preservation with less information loss. ACM SIGKDD Explorations 8 (2006) 21-30
-
(2006)
ACM SIGKDD Explorations
, vol.8
, pp. 21-30
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.6
-
4
-
-
33749568323
-
Workload-aware anonymization
-
Philadelphia, USA
-
K. LeFevre, D. DeWitt, R. Ramakrishnan, Workload-aware anonymization, in: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, USA, 2006, pp. 277-286.
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 277-286
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
5
-
-
33751370292
-
Priority-based k-anonymity accomplished by weighted generalisation structures
-
Krakow, Poland
-
K. Stark, J. Eder, K. Zatloukal, Priority-based k-anonymity accomplished by weighted generalisation structures, in: Proceedings of the Eighth International Data Warehousing and Knowledge Discovery Conference, Krakow, Poland, 2006, pp. 394-404.
-
(2006)
Proceedings of the Eighth International Data Warehousing and Knowledge Discovery Conference
, pp. 394-404
-
-
Stark, K.1
Eder, J.2
Zatloukal, K.3
-
6
-
-
84988315609
-
Fast data anonymization with low information loss
-
Vienna, Austria
-
G. Ghinita, P. Karras, P. Kalnis, N. Mamoulis, Fast data anonymization with low information loss, in: Proceedings of the 33rd International Conference on Very Large Data Bases, Vienna, Austria, 2007, pp. 758-769.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
9
-
-
70350686724
-
Anonymizing healthcare data: A case study on the blood transfusion service
-
Paris, France
-
N. Mohammed, B.C.M. Fung, P.C.K. Hung, C. Lee, Anonymizing healthcare data: a case study on the blood transfusion service, in: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 2009, pp. 1285-1294.
-
(2009)
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 1285-1294
-
-
Mohammed, N.1
Fung, B.C.M.2
Hung, P.C.K.3
Lee, C.4
-
10
-
-
33847092997
-
An epistemic framework for privacy protection in database linking
-
Wang D.W., Liau C.J., and Hsu T.S. An epistemic framework for privacy protection in database linking. Data and Knowledge Engineering 61 (2007) 176-205
-
(2007)
Data and Knowledge Engineering
, vol.61
, pp. 176-205
-
-
Wang, D.W.1
Liau, C.J.2
Hsu, T.S.3
-
11
-
-
63749126410
-
Data utility and privacy protection trade-off in k-anonymisation
-
Nantes, France
-
G. Loukides, J. Shao, Data utility and privacy protection trade-off in k-anonymisation, in: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, Nantes, France, 2008, pp. 36-45.
-
(2008)
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society
, pp. 36-45
-
-
Loukides, G.1
Shao, J.2
-
19
-
-
84856043672
-
A mathematical theory of communication
-
623-656
-
Shannon C.E. A mathematical theory of communication. Bell System Technical Journal 27 (1948) 379-423 623-656
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
23
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
Santa Barbara, California, United States, ACM
-
D. Agrawal, C.C. Aggarwal, On the design and quantification of privacy preserving data mining algorithms, in: Proceedings of the 20th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Santa Barbara, California, United States, ACM, 2001, pp. 247-255.
-
(2001)
Proceedings of the 20th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
24
-
-
33748550241
-
Privacy-preserving data mining
-
Chu W.W., and Lin T.Y. (Eds), Springer-Verlag
-
Clifton C., Kantarci{dotless}oglu M., and Vaidya J. Privacy-preserving data mining. In: Chu W.W., and Lin T.Y. (Eds). Foundations and Advances in Data Mining (2005), Springer-Verlag 313-344
-
(2005)
Foundations and Advances in Data Mining
, pp. 313-344
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
-
25
-
-
39749182452
-
The applicability of the perturbation based privacy preserving data mining for real-world data
-
Liu L., Kantarcioglu M., and Thuraisingham B. The applicability of the perturbation based privacy preserving data mining for real-world data. Data and Knowledge Engineering 65 (2008) 5-21
-
(2008)
Data and Knowledge Engineering
, vol.65
, pp. 5-21
-
-
Liu, L.1
Kantarcioglu, M.2
Thuraisingham, B.3
-
30
-
-
38049002436
-
-
R. Ostrovsky, W. Skeith, A Survey of Single-Database Private Information Retrieval: Techniques and Applications, in: Public Key Cryptography - PKC, 2007, pp. 393-411.
-
R. Ostrovsky, W. Skeith, A Survey of Single-Database Private Information Retrieval: Techniques and Applications, in: Public Key Cryptography - PKC, 2007, pp. 393-411.
-
-
-
-
32
-
-
0001751897
-
Disclosure limitation methods and information loss for tabular data
-
Doyle P., Lane J.I., Theeuwes J.J., and Zayatz L. (Eds), North-Holland, Amsterdam
-
Duncan G.T., Feinberg S.E., Krishnan R., Padman R., and Roehrig S.F. Disclosure limitation methods and information loss for tabular data. In: Doyle P., Lane J.I., Theeuwes J.J., and Zayatz L. (Eds). Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies (2001), North-Holland, Amsterdam 135-166
-
(2001)
Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies
, pp. 135-166
-
-
Duncan, G.T.1
Feinberg, S.E.2
Krishnan, R.3
Padman, R.4
Roehrig, S.F.5
-
33
-
-
77949652660
-
-
G.T. Duncan, S.A. Keller-McNulty, S.L. Stokes, Disclosure Risk vs. Data Utility: The R-U Confidentiality Map, Technical Report Number 121 of the National Institute of Statistical Sciences, 2001.
-
G.T. Duncan, S.A. Keller-McNulty, S.L. Stokes, Disclosure Risk vs. Data Utility: The R-U Confidentiality Map, Technical Report Number 121 of the National Institute of Statistical Sciences, 2001.
-
-
-
-
34
-
-
0000824403
-
A quantitative comparison of disclosure control methods for microdata
-
Doyle P., Lane J.I., Theeuwes J.J., and Zayatz L. (Eds), North-Holland, Amsterdam
-
Domingo-Ferrer J., and Torra V. A quantitative comparison of disclosure control methods for microdata. In: Doyle P., Lane J.I., Theeuwes J.J., and Zayatz L. (Eds). Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies (2001), North-Holland, Amsterdam 111-134
-
(2001)
Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies
, pp. 111-134
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
35
-
-
37249091183
-
Ordered dataset vectorization for linear regression on data privacy
-
Kitakyushu, Japan
-
P. Medrano-Gracia, J. Pont-Tuset, J. Nin, V. Muntes-Mulero, Ordered dataset vectorization for linear regression on data privacy, in: Proceedings of the Fourth International Conference on Modeling Decisions for Artificial Intelligence, Kitakyushu, Japan, 2007, pp. 361-372.
-
(2007)
Proceedings of the Fourth International Conference on Modeling Decisions for Artificial Intelligence
, pp. 361-372
-
-
Medrano-Gracia, P.1
Pont-Tuset, J.2
Nin, J.3
Muntes-Mulero, V.4
-
36
-
-
54349128838
-
On the disclosure risk of multivariate microaggregation
-
Nin J., Herranz J., and Torra V. On the disclosure risk of multivariate microaggregation. Data and Knowledge Engineering 67 (2008) 399-412
-
(2008)
Data and Knowledge Engineering
, vol.67
, pp. 399-412
-
-
Nin, J.1
Herranz, J.2
Torra, V.3
-
38
-
-
84949456343
-
Disclosure risk assessment in perturbative microdata protection
-
J. Domingo-Ferrer Ed
-
W.E. Yancey, W.E. Winkler, R.H. Creecy, Disclosure risk assessment in perturbative microdata protection, in: J. Domingo-Ferrer (Ed.), Inference Control in Statistical Databases, From Theory to Practice, 2002, pp. 135-152.
-
(2002)
Inference Control in Statistical Databases, From Theory to Practice
, pp. 135-152
-
-
Yancey, W.E.1
Winkler, W.E.2
Creecy, R.H.3
-
39
-
-
84949473075
-
Post-masking optimization of the tradeoff between information loss and disclosure risk in masked microdata sets
-
Domingo-Ferrer J. (Ed), Springer-Verlag
-
Sebe F., Domingo-Ferrer J., Mateo-Sanz J.M., and Torra V. Post-masking optimization of the tradeoff between information loss and disclosure risk in masked microdata sets. In: Domingo-Ferrer J. (Ed). Inference Control in Statistical Databases, From Theory to Practice (2002), Springer-Verlag 163-171
-
(2002)
Inference Control in Statistical Databases, From Theory to Practice
, pp. 163-171
-
-
Sebe, F.1
Domingo-Ferrer, J.2
Mateo-Sanz, J.M.3
Torra, V.4
-
42
-
-
49049098124
-
A critique of k-anonymity and some of its enhancements
-
Barcelona, Spain
-
J. Domingo-Ferrer, V. Torra, A critique of k-anonymity and some of its enhancements, in: Proceedings of the Third International Conference on Availability, Reliability and Security, Barcelona, Spain, 2008.
-
(2008)
Proceedings of the Third International Conference on Availability, Reliability and Security
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
43
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
Atlanta, USA
-
A. Machanavajjhala, J. Gehrke, D. Kiefer, M. Venkitasubramanian, L-diversity: privacy beyond k-anonymity, in: Proceedings of the 22nd IEEE International Conference on Data Engineering, Atlanta, USA, 2006.
-
(2006)
Proceedings of the 22nd IEEE International Conference on Data Engineering
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kiefer, D.3
Venkitasubramanian, M.4
-
44
-
-
34250661905
-
Achieving anonymity via clustering
-
Chicago, USA
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigraphy, D. Thomas, et al., Achieving anonymity via clustering, in: Proceedings of the 10th International Conference on Database Theory, Chicago, USA, 2005.
-
(2005)
Proceedings of the 10th International Conference on Database Theory
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigraphy, R.5
Thomas, D.6
|