-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam, N.R., Wortmann, J. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv. 21 (1989), 515-556.
-
(1989)
ACM Comput. Surv.
, vol.21
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.2
-
2
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
Blum, A., Dwork, C., McSherry, F., Nissim, K. Practical privacy: The SuLQ framework. In Proceedings of the 24th ACM Symposium on Principles of Database Systems (2005), 128-138.
-
(2005)
Proceedings of the 24th ACM Symposium on Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
3
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
Blum, A., Ligett, K., Roth, A. A learning theory approach to non-interactive database privacy. In Proceedings of the 40th ACM Symposium on Theory of Computing (2008), 609-618.
-
(2008)
Proceedings of the 40th ACM Symposium on Theory of Computing
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
4
-
-
0019054751
-
Secure statistical databases with random sample queries
-
Denning, D.E. Secure statistical databases with random sample queries. ACM Trans. Database Syst. 5 (1980), 291-315.
-
(1980)
ACM Trans. Database Syst.
, vol.5
, pp. 291-315
-
-
Denning, D.E.1
-
7
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Dwork, C., McSherry, F., Nissim, K., Smith, A. Calibrating noise to sensitivity in private data analysis. In Proceedings of the 3rd Theory of Cryptography Conference (2006), 265-284.
-
(2006)
Proceedings of the 3rd Theory of Cryptography Conference
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
8
-
-
35449000081
-
The price of privacy and the limits of lp decoding
-
Dwork, C., McSherry, F., Talwar, K. The price of privacy and the limits of lp decoding. In Proceedings of the 39th ACM Symposium on Theory of Computing (2007), 85-94.
-
(2007)
Proceedings of the 39th ACM Symposium on Theory of Computing
, pp. 85-94
-
-
Dwork, C.1
McSherry, F.2
Talwar, K.3
-
9
-
-
79959952201
-
On the diffculties of disclosure prevention in statistical databases or the case for differential privacy
-
Available at
-
Dwork, C. Naor, M. On the diffculties of disclosure prevention in statistical databases or the case for differential privacy. J. Privacy Confdentiality 2 (2010). Available at: http://repository.cmu.edu/jpc/vol2/iss1/ 8.
-
(2010)
J. Privacy Confdentiality
, Issue.2
-
-
Dwork, C.1
Naor, M.2
-
10
-
-
79960173817
-
Pan-private streaming algorithms
-
Dwork, C., Naor, M., Pitassi, T., Rothblum, G., Yekhanin, S. Pan-private streaming algorithms. In Proceedings of the 1st Symposium on Innovations in Computer Science (2010).
-
(2010)
Proceedings of the 1st Symposium on Innovations in Computer Science
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.4
Yekhanin, S.5
-
11
-
-
70350689921
-
When and how can privacy-preserving data release be done effciently?
-
Dwork, C., Naor, M., Reingold, O., Rothblum, G., Vadhan, S. When and how can privacy-preserving data release be done effciently? In Proceedings of the 41st ACM Symposium on Theory of Computing (2009), 381-390.
-
(2009)
Proceedings of the 41st ACM Symposium on Theory of Computing
, pp. 381-390
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.4
Vadhan, S.5
-
12
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
Dwork, C., Nissim, K. Privacy-preserving datamining on vertically partitioned databases. In Advances in Cryptology\CRYPTO'04 (2004), 528-544.
-
(2004)
Advances in Cryptology\CRYPTO'04
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
13
-
-
0021409284
-
Probabilistic encryption
-
Goldwasser, S., Micali, S. Probabilistic encryption. JCSS 28 (1984), 270-299.
-
(1984)
JCSS
, vol.28
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
16
-
-
0033699997
-
Auditing boolean attributes
-
Kleinberg, J., Papadimitriou, C., Raghavan, P. Auditing boolean attributes. In Proceedings of the 19th ACM Symposium on Principles of Database Systems (2000), 86-91.
-
(2000)
Proceedings of the 19th ACM Symposium on Principles of Database Systems
, pp. 86-91
-
-
Kleinberg, J.1
Papadimitriou, C.2
Raghavan, P.3
-
17
-
-
35348838459
-
On anonymizing query logs via token-based hashing
-
Kumar, R., Novak, J., Pang, B., Tomkins, A. On anonymizing query logs via token-based hashing. In Proceedings of the WWW 2007 (2007), 629-638.
-
(2007)
Proceedings of the WWW
, vol.2007
, pp. 629-638
-
-
Kumar, R.1
Novak, J.2
Pang, B.3
Tomkins, A.4
-
20
-
-
70350338483
-
Computational differential privacy
-
Mironov, I., Pandey, O., Reingold, O., Vadhan, S. Computational differential privacy. In Advances in Cryptology\CRYPTO'09 (2009), 126-142.
-
(2009)
Advances in Cryptology\CRYPTO'09
, pp. 126-142
-
-
Mironov, I.1
Pandey, O.2
Reingold, O.3
Vadhan, S.4
-
21
-
-
0012776989
-
Discussion: Statistical disclosure limitation
-
Rubin, D. Discussion: Statistical disclosure limitation. J. Offcial Statist. 9 (1993), 462-468.
-
(1993)
J. Offcial Statist.
, vol.9
, pp. 462-468
-
-
Rubin, D.1
-
22
-
-
0031150446
-
Weaving technology and policy together to maintain confdentiality
-
Sweeney, L. Weaving technology and policy together to maintain confdentiality. J. Law Med. Ethics 25 (1997), 98-110.
-
(1997)
J. Law Med. Ethics
, vol.25
, pp. 98-110
-
-
Sweeney, L.1
-
23
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
Warner, S. Randomized response: a survey technique for eliminating evasive answer bias. JASA (1965), 63-69.
-
(1965)
JASA
, pp. 63-69
-
-
Warner, S.1
|