-
2
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. R. Adam and J. C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Comput. Surv., 21(4):515-556, 1989.
-
(1989)
ACM Comput. Surv.
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
-
3
-
-
34250661905
-
Achieving anonymity via clustering
-
New York, NY, USA ACM
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. In PODS, pages 153-162, New York, NY, USA, 2006. ACM.
-
(2006)
PODS
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, pages 181-190, 2007.
-
(2007)
WWW
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.M.3
-
5
-
-
52649110562
-
Querying and managing provenance through user views in scientific workflows
-
O. Biton, S. Cohen-Boulakia, S. Davidson, and C. Hara. Querying and managing provenance through user views in scientific workflows. In ICDE, 2008.
-
(2008)
ICDE
-
-
Biton, O.1
Cohen-Boulakia, S.2
Davidson, S.3
Hara, C.4
-
6
-
-
70349092258
-
Optimizing user views for workflows
-
O. Biton, S. B. Davidson, S. Khanna, and S. Roy. Optimizing user views for workflows. In ICDT, pages 310-323, 2009.
-
(2009)
ICDT
, pp. 310-323
-
-
Biton, O.1
Davidson, S.B.2
Khanna, S.3
Roy, S.4
-
7
-
-
33646188319
-
Actor-oriented design of scientific workflows
-
S. Bowers and B. Ludäscher. Actor-oriented design of scientific workflows. In ER, 2005.
-
(2005)
ER
-
-
Bowers, S.1
Ludäscher, B.2
-
9
-
-
67650683099
-
A clustering approach for data and structural anonymity in social networks
-
A. Campan and T. M. Truta. A clustering approach for data and structural anonymity in social networks. In PinKDD, 2008.
-
(2008)
PinKDD
-
-
Campan, A.1
Truta, T.M.2
-
10
-
-
51849083449
-
Scientific workflow provenance querying with security views
-
July
-
A. Chebotko, S. Chang, S. Lu, F. Fotouhi, and P. Yang. Scientific workflow provenance querying with security views. WAIM, pages 349-356, July 2008.
-
(2008)
WAIM
, pp. 349-356
-
-
Chebotko, A.1
Chang, S.2
Lu, S.3
Fotouhi, F.4
Yang, P.5
-
11
-
-
79952323179
-
Preserving module privacy in workflow provenance
-
Dept. of Computer and Information Science, University of Pennsylvania, May
-
S. B. Davidson, S. Khanna, D. Panigrahi, and S. Roy. Preserving module privacy in workflow provenance. Technical Report MS-CIS-10-22, Dept. of Computer and Information Science, University of Pennsylvania, May 2010.
-
(2010)
Technical Report MS-CIS-10-22
-
-
Davidson, S.B.1
Khanna, S.2
Panigrahi, D.3
Roy, S.4
-
12
-
-
1142275486
-
Revealing information while preserving privacy
-
New York, NY, USA ACM
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, New York, NY, USA, 2003. ACM.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
13
-
-
70349305273
-
Differential privacy: A survey of results
-
C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1-19, 2008.
-
(2008)
TAMC
, pp. 1-19
-
-
Dwork, C.1
-
14
-
-
70350645515
-
The differential privacy frontier (extended abstract)
-
C. Dwork. The differential privacy frontier (extended abstract). In TCC, pages 496-502, 2009.
-
(2009)
TCC
, pp. 496-502
-
-
Dwork, C.1
-
15
-
-
33750091709
-
Managing rapidly-evolving scientific workflows
-
J. Freire, C. T. Silva, S. P. Callahan, E. Santos, C. E. Scheidegger, and H. T. Vo. Managing rapidly-evolving scientific workflows. In IPAW, 2006.
-
(2006)
IPAW
-
-
Freire, J.1
Silva, C.T.2
Callahan, S.P.3
Santos, E.4
Scheidegger, C.E.5
Vo, H.T.6
-
18
-
-
62749161358
-
Introducing secure provenance: Problems and challenges
-
New York, NY, USA ACM
-
R. Hasan, R. Sion, and M. Winslett. Introducing secure provenance: problems and challenges. In StorageSS, pages 13-18, New York, NY, USA, 2007. ACM.
-
(2007)
StorageSS
, pp. 13-18
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
19
-
-
70349248583
-
Link privacy in social networks
-
New York, NY, USA ACM
-
A. Korolova, R. Motwani, S. U. Nabar, and Y. Xu. Link privacy in social networks. In CIKM, pages 289-298, New York, NY, USA, 2008. ACM.
-
(2008)
CIKM
, pp. 289-298
-
-
Korolova, A.1
Motwani, R.2
Nabar, S.U.3
Xu, Y.4
-
21
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1(1):3, 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
23
-
-
84862604885
-
Towards robustness in query auditing
-
VLDB Endowment
-
S. U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani. Towards robustness in query auditing. In VLDB, pages 151-162. VLDB Endowment, 2006.
-
(2006)
VLDB
, pp. 151-162
-
-
Nabar, S.U.1
Marthi, B.2
Kenthapadi, K.3
Mishra, N.4
Motwani, R.5
-
24
-
-
10244255212
-
Taverna: A tool for the composition and enactment of bioinformatics workflows
-
T. Oinn et al. Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics, 20(1), 2003.
-
(2003)
Bioinformatics
, vol.20
, Issue.1
-
-
Oinn, T.1
-
25
-
-
70350635777
-
Relationship privacy: Output perturbation for queries with joins
-
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107-116, 2009.
-
(2009)
PODS
, pp. 107-116
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
26
-
-
70849121002
-
Detecting and resolving unsound workflow views for correct provenance analysis
-
New York, NY, USA ACM
-
P. Sun, Z. Liu, S. B. Davidson, and Y. Chen. Detecting and resolving unsound workflow views for correct provenance analysis. In SIGMOD '09: Proceedings of the 35th SIGMOD international conference on Management of data, pages 549-562, New York, NY, USA, 2009. ACM.
-
(2009)
SIGMOD '09: Proceedings of the 35th SIGMOD International Conference on Management of Data
, pp. 549-562
-
-
Sun, P.1
Liu, Z.2
Davidson, S.B.3
Chen, Y.4
-
28
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. SIGMOD Rec., 33(1):50-57, 2004.
-
(2004)
SIGMOD Rec.
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
|