-
2
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Tokyo, Japan
-
B. Fung, K. Wang, P. Yu, Topdown specialization for information and privacy preservation, in: Proc. of the 21st International Conference on Data Engineering, ICDE'05, Tokyo, Japan.
-
Proc. of the 21st International Conference on Data Engineering, ICDE'05
-
-
Fung, B.1
Wang, K.2
Yu, P.3
-
6
-
-
77049087087
-
Anonymizing tables
-
Edinburgh, Scotland
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, A. Zhu, Anonymizing tables, in: Proc. of the 10th International Conference on Database Theory, ICDT'05, Edinburgh, Scotland, pp. 246258.
-
Proc. of the 10th International Conference on Database Theory, ICDT'05
, pp. 246-258
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
8
-
-
0000964471
-
Measure of disclosure risk and harm
-
D. Lambert Measure of disclosure risk and harm Journal of Official Statistics 9 1993 313 331
-
(1993)
Journal of Official Statistics
, vol.9
, pp. 313-331
-
-
Lambert, D.1
-
9
-
-
51849103075
-
Privacy protection: P-sensitive k-anonymity property
-
Atlanta
-
T.M. Traian, V. Bindu, Privacy protection: p-sensitive k-anonymity property, in: International Workshop of Privacy Data Management, PDM2006, Conjunction with 22nd International Conference of Data Engineering, ICDE, Atlanta, 2006.
-
(2006)
International Workshop of Privacy Data Management, PDM2006, Conjunction with 22nd International Conference of Data Engineering, ICDE
-
-
Traian, T.M.1
Bindu, V.2
-
10
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, l-diversity: privacy beyond k-anonymity, in: ICDE, 2006.
-
(2006)
ICDE
-
-
MacHanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
11
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
N. Li, T. Li, S. Venkatasubramanian, t-closeness: privacy beyond k-anonymity and l-diversity, in: ICDE, 2007, pp. 106115.
-
(2007)
ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
13
-
-
33749571958
-
(α,k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing
-
R. Wong, J. Li, A. Fu, K. Wang, (α, k ) -anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in: KDD, 2006, pp. 754759.
-
(2006)
KDD
, pp. 754-759
-
-
Wong, R.1
Li, J.2
Fu, A.3
Wang, K.4
-
14
-
-
38049087648
-
Generating microdata with P-sensitivek-anonymity property
-
T.M. Traian, A. Campan, P. Meyer, Generating microdata with P-sensitivek-anonymity property, in: SDM, 2007, pp. 124141.
-
(2007)
SDM
, pp. 124-141
-
-
Traian, T.M.1
Campan, A.2
Meyer, P.3
-
16
-
-
33749568323
-
Workload-aware anonymisation
-
ACM Press Philadelphia, PA, USA
-
K. LeFevre, D.J. DeWitt, and R. Ramakrishnan Workload-aware anonymisation KDD'06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2006 ACM Press Philadelphia, PA, USA 277 286
-
(2006)
KDD'06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 277-286
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
17
-
-
33749606641
-
Mondrian multidimensionalk-anonymity
-
ICDE'06 IEEE Computer Society Washington, DC, USA
-
K. LeFevre, D.J. DeWitt, and R. Ramakrishnan Mondrian multidimensionalk-anonymity ICDE'06: Proceedings of the 22nd International Conference on Data Engineering ICDE'06 2006 IEEE Computer Society Washington, DC, USA 25
-
(2006)
ICDE'06: Proceedings of the 22nd International Conference on Data Engineering
, pp. 25
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
18
-
-
33749582207
-
Utility-based anonymisation using local recoding
-
ACM Press Philadelphia, PA, USA
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A.W.C. Fu Utility-based anonymisation using local recoding KDD'06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2006 ACM Press Philadelphia, PA, USA 785 790
-
(2006)
KDD'06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.C.6
-
21
-
-
33749568934
-
Template-based privacy preservation in classification problems
-
K. Wang, B.C.M. Fung, P.S. Yu, Template-based privacy preservation in classification problems, in: ICDM05, 2005.
-
(2005)
ICDM05
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
22
-
-
67649641460
-
Modeling and integrating background knowledge in data anonymization
-
T. Li, N. Li, J. Zhang, Modeling and integrating background knowledge in data anonymization, in: ICDE, 2009.
-
(2009)
ICDE
-
-
Li, T.1
Li, N.2
Zhang, J.3
-
23
-
-
70350634219
-
On the tradeoff between privacy and utility in data publishing
-
(in press)
-
T. Li, N. Li, On the tradeoff between privacy and utility in data publishing, in: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, SIGKDD, 2009, pp. 517526 (in press).
-
(2009)
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, SIGKDD
, pp. 517-526
-
-
Li, T.1
Li, N.2
-
24
-
-
85011039411
-
Privacy skyline: Privacy with multidimensional adversarial knowledge
-
B.C. Chen, K. LeFevre, R. Ramakrishnan, Privacy skyline: privacy with multidimensional adversarial knowledge, in: Proc. of the Int'l Conf. on Very Large Data Bases, VLDB, 2007, pp. 770781.
-
(2007)
Proc. of the Int'l Conf. on Very Large Data Bases, VLDB
, pp. 770-781
-
-
Chen, B.C.1
Lefevre, K.2
Ramakrishnan, R.3
-
25
-
-
34548748619
-
Worst-case background knowledge for privacy-preserving data publishing
-
D.J. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, J.Y. Halpern, Worst-case background knowledge for privacy-preserving data publishing, in: Proc. Int'l Conf. Data Engineering, ICDE, 2007, pp. 126135.
-
(2007)
Proc. Int'l Conf. Data Engineering, ICDE
, pp. 126-135
-
-
Martin, D.J.1
Kifer, D.2
MacHanavajjhala, A.3
Gehrke, J.4
Halpern, J.Y.5
-
27
-
-
35248860015
-
Secure anonymization for incremental datasets, Secure Data Management
-
J.W. Byun, Y. Sohn, E. Bertino, N. Li, Secure anonymization for incremental datasets, Secure Data Management, SDM, 2006, p. 4863.
-
(2006)
SDM
, pp. 4863
-
-
Byun, J.W.1
Sohn, Y.2
Bertino, E.3
Li, N.4
-
28
-
-
35448967088
-
M-invariance: Towards privacy preserving republication of dynamic datasets
-
X. Xiao, Y. Tao, m-invariance: towards privacy preserving republication of dynamic datasets, in: Proc. of the ACM SIGMOD Int'l Conf. on Management of Data, SIGMOD, 2007, pp. 689700.
-
(2007)
Proc. of the ACM SIGMOD Int'l Conf. on Management of Data, SIGMOD
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
29
-
-
58349121531
-
L-diversity based dynamic update for large time-evolving microdata
-
X. Sun, H. Wang, J. Li, L-diversity based dynamic update for large time-evolving microdata, in: Australasian Conference on Artificial Intelligence, 2008, pp. 461469.
-
(2008)
Australasian Conference on Artificial Intelligence
, pp. 461-469
-
-
Sun, X.1
Wang, H.2
Li, J.3
-
30
-
-
35448937300
-
Hiding the presence of individuals from shared databases
-
M.E. Nergiz, M. Atzori, C. Clifton, Hiding the presence of individuals from shared databases, in: Proc. of the ACM SIGMOD Int'l Conf. on Management of Data, SIGMOD, 2007, pp. 665676.
-
(2007)
Proc. of the ACM SIGMOD Int'l Conf. on Management of Data, SIGMOD
, pp. 665-676
-
-
Nergiz, M.E.1
Atzori, M.2
Clifton, C.3
-
31
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
R. Wong, A. Fu, K. Wang, J. Pei, Minimality attack in privacy preserving data publishing, in: Proc. of the Int'l Conf. on Very Large Data Bases, VLDB, 2007. pp. 543554.
-
(2007)
Proc. of the Int'l Conf. on Very Large Data Bases, VLDB
, pp. 543-554
-
-
Wong, R.1
Fu, A.2
Wang, K.3
Pei, J.4
-
32
-
-
78649333205
-
Distribution-based microdata anonymization
-
(in press)
-
N. Koudas, D. Srivastava, T. Yu, Q. Zhang, Distribution-based microdata anonymization, in: the 35th International Conference on Very Large Data Bases, VLDB, 2009, pp. 958969 (in press).
-
(2009)
The 35th International Conference on Very Large Data Bases, VLDB
, pp. 958-969
-
-
Koudas, N.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
34
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
X. Xiao, Y. Tao, Anatomy: simple and effective privacy preservation, in: Proc. of the Int'l Conf. on Very Large Data Bases, VLDB, 2006, pp. 139150.
-
(2006)
Proc. of the Int'l Conf. on Very Large Data Bases, VLDB
, pp. 139-150
-
-
Xiao, X.1
Tao, Y.2
-
35
-
-
34250661905
-
Achieving anonymity via clustering
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, A. Zhu, Achieving anonymity via clustering, in: Proc. of the ACM Symp. on Principles of Database Systems, PODS, 2006, pp. 153162.
-
(2006)
Proc. of the ACM Symp. on Principles of Database Systems, PODS
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
36
-
-
34250673244
-
Injecting utility into anonymized datasets
-
D. Kifer, J. Gehrke, Injecting utility into anonymized datasets, in: Proc. of the ACM SIGMOD Int'l Conf. on Management of Data, SIGMOD, 2006, pp. 217228.
-
(2006)
Proc. of the ACM SIGMOD Int'l Conf. on Management of Data, SIGMOD
, pp. 217-228
-
-
Kifer, D.1
Gehrke, J.2
-
37
-
-
74549220778
-
Injecting purpose and trust into data anonymization
-
(in press)
-
X. Sun, H. Wang, J. Li, Injecting purpose and trust into data anonymization, in: CIKM, 2009, pp. 15411544 (in press).
-
(2009)
CIKM
, pp. 1541-1544
-
-
Sun, X.1
Wang, H.2
Li, J.3
-
38
-
-
34250680246
-
Personalized privacy preservation
-
X. Xiao, Y. Tao, Personalized privacy preservation, in: Proc. of the ACM SIGMOD Int'l Conf. on Management of Data, SIGMOD, 2006, pp. 229240.
-
(2006)
Proc. of the ACM SIGMOD Int'l Conf. on Management of Data, SIGMOD
, pp. 229-240
-
-
Xiao, X.1
Tao, Y.2
-
39
-
-
26944448516
-
Ordinal, continuous and heterogeneousk-anonymity through microaggregation
-
J. Domingo-Ferrer, V. Torra, Ordinal, continuous and heterogeneousk- anonymity through microaggregation, Data Mining and Knowledge Discovery 11, pp. 195212.
-
Data Mining and Knowledge Discovery
, vol.11
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
40
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
Paris, France
-
A. Meyerson, R. Williams, On the complexity of optimal k-anonymity, in: Proc. of the 23rd ACM-SIGMOD-SIGACT-SIGART Symposium on the Principles of Database Systems, Paris, France, 2004, pp. 223228.
-
(2004)
Proc. of the 23rd ACM-SIGMOD-SIGACT-SIGART Symposium on the Principles of Database Systems
, pp. 223-228
-
-
Meyerson, A.1
Williams, R.2
-
41
-
-
43749088488
-
On the complexity of restricted k-anonymity problem
-
X. Sun, H. Wang, J. Li, On the complexity of restricted k-anonymity problem, in: APWeb, 2008, pp. 287296.
-
(2008)
APWeb
, pp. 287-296
-
-
Sun, X.1
Wang, H.2
Li, J.3
|