-
1
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
doi: 10.1109/69.971193
-
Samarati P. Protecting respondents' identities in microdata release. IEEE Trans. on Knowledge and Data Engineering, 2001, 13(6): 1010-1027. [doi: 10.1109/69.971193]
-
(2001)
IEEE Trans. on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
3
-
-
33749607006
-
l-Diversity: Privacy beyond k-anonymity
-
In: Liu L, Reuter A, Whang KY, Zhang JJ, eds. Los Alamitos: IEEE Computer Society
-
Machanavajjhala A, Gehrke J, Kifer D. l-Diversity: Privacy beyond k-anonymity. In: Liu L, Reuter A, Whang KY, Zhang JJ, eds. Proc. of the 22nd Int'l Conf. on Data Engineering. Los Alamitos: IEEE Computer Society, 2006. 24.
-
(2006)
Proc. of the 22nd Int'l Conf. on Data Engineering
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
-
4
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
doi: 10.1142/S021848850200165X
-
Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. Int'l Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems, 2002, 10(5):571-588. [doi: 10.1142/S021848850200165X]
-
(2002)
Int'l Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
5
-
-
34250661905
-
Achieving anonymity via clustering
-
In: Vansummeren S, ed. New York: ACM
-
Aggarwal G, Feder T, Kenthapadi K, Khuller S, Panigrahy R, Thomas D, Zhu A. Achieving anonymity via clustering. In: Vansummeren S, ed. Proc. of the 25th ACM SIGMOD-SIGACT-SIGART Symp. on Principles of Database Systems. New York: ACM, 2006. 153-162.
-
(2006)
Proc. of the 25th ACM SIGMOD-SIGACT-SIGART Symp. on Principles of Database Systems
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
8
-
-
19544380211
-
Bottom-Up generalization: A data mining solution to privacy protection
-
In: Rastogi R, Morik K, Bramer M, Wu XD, eds. Los Alamitos: IEEE Computer Society
-
Wang K, Yu P, Chakraborty S. Bottom-Up generalization: A data mining solution to privacy protection. In: Rastogi R, Morik K, Bramer M, Wu XD, eds. Proc. of the 4th IEEE Int'l Conf. on Data Mining. Los Alamitos: IEEE Computer Society, 2004. 249-256.
-
(2004)
Proc. of the 4th IEEE Int'l Conf. on Data Mining
, pp. 249-256
-
-
Wang, K.1
Yu, P.2
Chakraborty, S.3
-
10
-
-
28444499680
-
Top-Down specialization for information and privacy preservation
-
In: Toyama M, Sasaki S, eds. Los Alamitos: IEEE Computer Society
-
Fung B, Wang K, Yu P. Top-Down specialization for information and privacy preservation. In: Toyama M, Sasaki S, eds. Proc. of the 21st Int'l Conf. on Data Engineering. Los Alamitos: IEEE Computer Society, 2005. 205-216.
-
(2005)
Proc. of the 21st Int'l Conf. on Data Engineering
, pp. 205-216
-
-
Fung, B.1
Wang, K.2
Yu, P.3
-
11
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
In: Toyama M, Sasaki S, eds. Los Alamitos: IEEE Computer Society
-
Bayardo R, Agrawal R. Data privacy through optimal k-anonymization. In: Toyama M, Sasaki S, eds. Proc. of the 21st Int'l Conf. on Data Engineering. Los Alamitos: IEEE Computer Society, 2005. 217-228.
-
(2005)
Proc. of the 21st Int'l Conf. on Data Engineering
, pp. 217-228
-
-
Bayardo, R.1
Agrawal, R.2
-
12
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
In: Liu L, Reuter A, Whang KY, Zhang JJ, eds. Los Alamitos: IEEE Computer Society
-
LeFevre K, DeWitt D, Ramakrishnan R. Mondrian multidimensional k-anonymity. In: Liu L, Reuter A, Whang KY, Zhang JJ, eds. Proc. of the 22nd Int'l Conf. on Data Engineering. Los Alamitos: IEEE Computer Society, 2006. 25.
-
(2006)
Proc. of the 22nd Int'l Conf. on Data Engineering
, pp. 25
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
13
-
-
33751359260
-
Achieving k-anonymity by clustering in attribute hierarchical structures
-
In: Tjoa AM, Trujillo J, eds. Heidelberg: Springer-Verlag
-
Li JY, Wong R, Fu A, Pei J. Achieving k-anonymity by clustering in attribute hierarchical structures. In: Tjoa AM, Trujillo J, eds. Proc. of the 8th Int'l Conf. on Data Warehousing and Knowledge Discovery. Heidelberg: Springer-Verlag, 2006. 405-416.
-
(2006)
Proc. of the 8th Int'l Conf. on Data Warehousing and Knowledge Discovery
, pp. 405-416
-
-
Li, J.Y.1
Wong, R.2
Fu, A.3
Pei, J.4
-
14
-
-
38049126170
-
Efficient k-anonymization using clustering techniques
-
In: Kotagiri R, Krishna PR, Mohania M, Nantajeewarawat E, eds. Heidelberg: Springer-Verlag
-
Byun JW, Kamra A, Bertino E, Li NH. Efficient k-anonymization using clustering techniques. In: Kotagiri R, Krishna PR, Mohania M, Nantajeewarawat E, eds. Proc. of the 12th Int'l Conf. on Database Systems for Advanced Applications. Heidelberg: Springer-Verlag, 2007. 188-200.
-
(2007)
Proc. of the 12th Int'l Conf. on Database Systems for Advanced Applications
, pp. 188-200
-
-
Byun, J.W.1
Kamra, A.2
Bertino, E.3
Li, N.H.4
-
15
-
-
33745757998
-
K-Anonymization approaches for supporting multiple constraints
-
in Chinese with English abstract [doi: 10.1360/jos171222]
-
Yang XC, Liu XY, Wang B, Ge Y. K-Anonymization approaches for supporting multiple constraints. Journal of Software, 2006, 17(5):1222-1231 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/17/1222.htm [doi: 10.1360/jos171222]
-
(2006)
Journal of Software
, vol.17
, Issue.5
, pp. 1222-1231
-
-
Yang, X.C.1
Liu, X.Y.2
Wang, B.3
Ge, Y.4
-
16
-
-
33749582207
-
Utility-Based anonymization using local recoding
-
In: Eliassi-Rad T, Ungar L, Craven M, Gunopulos D, eds. New York: ACM
-
Xu J, Wang W, Pei J, Wang XY, Shi BL, Fu A. Utility-Based anonymization using local recoding. In: Eliassi-Rad T, Ungar L, Craven M, Gunopulos D, eds. Proc. of the 12th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining. New York: ACM, 2006. 785-790.
-
(2006)
Proc. of the 12th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.Y.4
Shi, B.L.5
Fu, A.6
-
17
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
In: Dayal U, Whang KY, Lomet D, Alonso G, Lohman G, Kersten M, Cha SK, Kim YK, eds. New York: ACM
-
Xiao XK, Tao YF. Anatomy: Simple and effective privacy preservation. In: Dayal U, Whang KY, Lomet D, Alonso G, Lohman G, Kersten M, Cha SK, Kim YK, eds. Proc. of the 32nd Int'l Conf. on Very Large Data Bases. New York: ACM, 2006. 139-150.
-
(2006)
Proc. of the 32nd Int'l Conf. on Very Large Data Bases
, pp. 139-150
-
-
Xiao, X.K.1
Tao, Y.F.2
|