메뉴 건너뛰기




Volumn 54, Issue 1, 2011, Pages 86-95

A firm foundation for private data analysis

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL ACCESS; CONTROL PROBLEMS; DIFFERENTIAL PRIVACIES; DISCLOSURE CONTROL; OFFICIAL STATISTICS; PRIVACY PRESERVING; PRIVATE DATA ANALYSIS; STATISTICAL ANALYSIS; STATISTICAL DISCLOSURE CONTROL; THEORETICAL COMPUTER SCIENCE;

EID: 78650804208     PISSN: 00010782     EISSN: 15577317     Source Type: Journal    
DOI: 10.1145/1866739.1866758     Document Type: Review
Times cited : (738)

References (23)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • Adam, N.R., Wortmann, J. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv. 21 (1989), 515-556.
    • (1989) ACM Comput. Surv. , vol.21 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.2
  • 4
    • 0019054751 scopus 로고
    • Secure statistical databases with random sample queries
    • Denning, D.E. Secure statistical databases with random sample queries. ACM Trans. Database Syst. 5 (1980), 291-315.
    • (1980) ACM Trans. Database Syst. , vol.5 , pp. 291-315
    • Denning, D.E.1
  • 9
    • 79959952201 scopus 로고    scopus 로고
    • On the diffculties of disclosure prevention in statistical databases or the case for differential privacy
    • Available at
    • Dwork, C. Naor, M. On the diffculties of disclosure prevention in statistical databases or the case for differential privacy. J. Privacy Confdentiality 2 (2010). Available at: http://repository.cmu.edu/jpc/vol2/iss1/ 8.
    • (2010) J. Privacy Confdentiality , Issue.2
    • Dwork, C.1    Naor, M.2
  • 12
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving datamining on vertically partitioned databases
    • Dwork, C., Nissim, K. Privacy-preserving datamining on vertically partitioned databases. In Advances in Cryptology\CRYPTO'04 (2004), 528-544.
    • (2004) Advances in Cryptology\CRYPTO'04 , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 13
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • Goldwasser, S., Micali, S. Probabilistic encryption. JCSS 28 (1984), 270-299.
    • (1984) JCSS , vol.28 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 17
    • 35348838459 scopus 로고    scopus 로고
    • On anonymizing query logs via token-based hashing
    • Kumar, R., Novak, J., Pang, B., Tomkins, A. On anonymizing query logs via token-based hashing. In Proceedings of the WWW 2007 (2007), 629-638.
    • (2007) Proceedings of the WWW , vol.2007 , pp. 629-638
    • Kumar, R.1    Novak, J.2    Pang, B.3    Tomkins, A.4
  • 21
    • 0012776989 scopus 로고
    • Discussion: Statistical disclosure limitation
    • Rubin, D. Discussion: Statistical disclosure limitation. J. Offcial Statist. 9 (1993), 462-468.
    • (1993) J. Offcial Statist. , vol.9 , pp. 462-468
    • Rubin, D.1
  • 22
    • 0031150446 scopus 로고    scopus 로고
    • Weaving technology and policy together to maintain confdentiality
    • Sweeney, L. Weaving technology and policy together to maintain confdentiality. J. Law Med. Ethics 25 (1997), 98-110.
    • (1997) J. Law Med. Ethics , vol.25 , pp. 98-110
    • Sweeney, L.1
  • 23
    • 0013776710 scopus 로고
    • Randomized response: A survey technique for eliminating evasive answer bias
    • Warner, S. Randomized response: a survey technique for eliminating evasive answer bias. JASA (1965), 63-69.
    • (1965) JASA , pp. 63-69
    • Warner, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.