-
1
-
-
0036811662
-
Fc-anonymity: A model for protecting privacy
-
Fuzziness and Knowledge-Based Systems
-
Sweeney, L. 2002. fc-Anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems 10(5):557–570.
-
(2002)
International Journal on Uncertainty
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
2
-
-
33749607006
-
L diversity: Privacy beyond fc-anonymity
-
Machanavajjhala, A., Gehrke, J., Kifer, D., and Venkitasubramaniam, M. 2006. L Diversity: privacy beyond fc-anonymity In Proceedings of the IEEE International Conference on Data Engineering.
-
(2006)
Proceedings of the IEEE International Conference on Data Engineering
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
4
-
-
34250661905
-
Achieving anonymity via clustering
-
Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., and Zhu, A. 2006. Achieving anonymity via clustering. In Proceedings of PODS, pp. 153–162.
-
(2006)
Proceedings of PODS
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
6
-
-
35448967088
-
M-invariance: Towards privacy preserving republication of dynamic datasets
-
Xiao, X., and Tao, Y. 2007. M-invariance: towards privacy preserving republication of dynamic datasets. In Proceedings of the SIGMOD Conference, pp. 689–700.
-
(2007)
Proceedings of the SIGMOD Conference
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
7
-
-
34548748619
-
Worst–case background knowledge for privacy-preserving data publishing
-
Martin, D. J., Kifer, D., Machanavajjhala, A., Gehrke, J., and Halpern, J. Y. 2007. Worst-case background knowledge for privacy–preserving data publishing. In Proceedings of the ICDE.
-
(2007)
Proceedings of the ICDE
-
-
Martin, D.J.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.Y.5
-
10
-
-
0242674432
-
Hippocratic databases
-
Agrawal, R., Kieman, J., Srikant, R., and Xu, Y. 2002. Hippocratic databases. In Proceedings of the 28th International Conference on Very Large Data Bases.
-
(2002)
Proceedings of the 28Th International Conference on Very Large Data Bases
-
-
Agrawal, R.1
Kieman, J.2
Srikant, R.3
Xu, Y.4
-
11
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., and DeWitt, D. 2004. Limiting disclosure in Hippocratic databases. In Proceedings of the 30th International Conference on Very Large Data Bases.
-
(2004)
Proceedings of the 30Th International Conference on Very Large Data Base
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.6
-
12
-
-
28444446666
-
Extending relational database systems to automatically enforce privacy policies
-
Agrawal, R., Bird, P., Grandison, T., Kieman, J., Logan, S., and Rjaibi, W. 2005. Extending relational database systems to automatically enforce privacy policies. In Proceedings of the 21st IEEE International Conference on Data Engineering.
-
(2005)
Proceedings of the 21St IEEE International Conference on Data Engineering
-
-
Agrawal, R.1
Bird, P.2
Grandison, T.3
Kieman, J.4
Logan, S.5
Rjaibi, W.6
-
13
-
-
30644474612
-
Purpose based access control of complex data for privacy protection
-
Byun, J.-W., Bertino, E., and Li, N. 2005. Purpose based access control of complex data for privacy protection. In ACM Symposium on Access Control Models, and Technologies (SACMAT).
-
(2005)
ACM Symposium on Access Control Models, and Technologies (SACMAT)
-
-
Byun, J.-W.1
Bertino, E.2
Li, N.3
-
14
-
-
33644919398
-
Micro–views, or on how to protect privacy while enhancing data usability—concept and challenges
-
Byun, J., and Bertino, E. 2006. Micro-views, or on how to protect privacy while enhancing data usability—concept and challenges. SIGMOD Record 35(1): 9–13.
-
(2006)
SIGMOD Record
, vol.35
, Issue.1
, pp. 9-13
-
-
Byun, J.1
Bertino, E.2
-
15
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adams, N. R., and Wortman, J. C. 1989. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys 21(4):515–556.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adams, N.R.1
Wortman, J.C.2
-
16
-
-
77951201056
-
Privacy-preserving data publishing: A survey on recent developments
-
Fung, B. C. M., Wang, K., Chen, R., and Yu, P. S. 2010. Privacy-preserving data publishing: a survey on recent developments. ACM Computing Surveys, 42 (4).
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
18
-
-
19544380211
-
Bottom-up generalization: A data mining solution to privacy protection
-
Wang, K., Yu, P. S., and Chakraborty, S. 2004. Bottom–up generalization: a data mining solution to privacy protection. In Proceedings of ICDM.
-
(2004)
Proceedings of ICDM
-
-
Wang, K.1
Yu, P.S.2
Chakraborty, S.3
-
22
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Fung, B. C. M., Wang, K., and Yu, P. S. 2005. Top-down specialization for information and privacy preservation. In Proceedings of ICDE.
-
(2005)
Proceedings of ICDE
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
23
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
Bertino, E., Ooi, B. C., Yang, Y., and Deng, R. H. 2005. Privacy and ownership preserving of outsourced medical data. In Proceedings of the ICDE 2005.
-
(2005)
Proceedings of the ICDE
-
-
Bertino, E.1
Ooi, B.C.2
Yang, Y.3
Deng, R.H.4
-
24
-
-
33244463520
-
Privacy-enhancing k-anonymization of customer data
-
Zhong, S., Yang, Z., and Wright, R. N. 2005. Privacy-enhancing k-anonymization of customer data. In Proceedings of PODS, pp. 139–147.
-
(2005)
Proceedings of PODS
, pp. 139-147
-
-
Zhong, S.1
Yang, Z.2
Wright, R.N.3
-
31
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
Zhang, Q., Koudas, N., Srivastava, D., and Yu, T. 2007. Aggregate query answering on anonymized tables. In Proceedings of ICDE.
-
(2007)
Proceedings of ICDE
-
-
Zhang, Q.1
Koudas, N.2
Srivastava, D.3
Yu, T.4
-
32
-
-
0030333205
-
Replacing personally-identifying information in medical records, the scrub system
-
Sweeney, L. 1996. Replacing personally-identifying information in medical records, the scrub system. Journal of the American Informatics Association, 333–337.
-
(1996)
Journal of the American Informatics Association
, pp. 333-337
-
-
Sweeney, L.1
-
33
-
-
0344024833
-
Guaranteeing anonymity when sharing medical data, the datafly system
-
Sweeney, L. 1997. Guaranteeing anonymity when sharing medical data, the datafly system. In Proceedings of AMIA Annual Fall Symposium.
-
(1997)
Proceedings Of
-
-
Sweeney, L.1
-
34
-
-
0036368242
-
A successful technique for removing names in pathology reports
-
Thomas, S. M., Mamlin, B., Schadow, G., and McDonald, C. 2002. A successful technique for removing names in pathology reports. In Proceedings of the Annual AMIA Symposium, pp. 777–781.
-
(2002)
Proceedings of the Annual
, pp. 777-781
-
-
Thomas, S.M.1
Mamlin, B.2
Schadow, G.3
McDonald, C.4
-
35
-
-
0036369895
-
Identification of patient name references within medical documents using semantic selectional restrictions
-
Taira, R. K., Bui, A. A., and Kangarloo, H. 2002. Identification of patient name references within medical documents using semantic selectional restrictions. In Proceedings of the AMIA Symposium.
-
(2002)
Proceedings of the AMIA Symposium
-
-
Taira, R.K.1
Bui, A.A.2
Kangarloo, H.3
-
36
-
-
0942266011
-
Evaluation of a de-identification (De-id) software engine to share pathology reports and clinical documents for research
-
Gupta, D., Saul, M., and Gilbertson, J. 2004. Evaluation of a de-identification (De-id) software engine to share pathology reports and clinical documents for research. American Journal of Clinical Pathology 121(2):176–186.
-
(2004)
American Journal of Clinical Pathology
, vol.121
, Issue.2
, pp. 176-186
-
-
Gupta, D.1
Saul, M.2
Gilbertson, J.3
-
38
-
-
85057921906
-
Development and evaluation of an open source software tool for de-identification of pathology reports
-
Beckwith, B. A., Mahaadevan, R., Balis, U. J., and Kuo, F. 2006. Development and evaluation of an open source software tool for de-identification of pathology reports. BMC Medical Informatics and Decision Making 42(1):13–35.
-
(2006)
BMC Medical Informatics and Decision Making
, vol.42
, Issue.1
, pp. 13-35
-
-
Beckwith, B.A.1
Mahaadevan, R.2
Balis, U.J.3
Kuo, F.4
-
40
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
Verykios, V. S., Bertino, E., Fovino, I.N., Provenza, L. P., Saygin, Y., and Theodoridis, Y. 2004. State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 33(1):50–57.
-
(2004)
ACM SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
41
-
-
34548772871
-
-
Bu, S., Lakshmanan, L. V. S., Ng, R. T., and Ramesh, G. 2007. Preservation of patterns and input-output privacy. In Proceedings of the ICDE.
-
Proceedings of the ICDE
-
-
Bu, S.1
Lakshmanan, L.V.S.2
Ng, R.T.3
Ramesh, G.4
-
43
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
Evfimievski, A. V., Gehrke, J., and Srikant, R. 2003. Limiting privacy breaches in privacy preserving data mining. In Proceedings of PODS, pp. 211–222.
-
(2003)
Proceedings of PODS
, pp. 211-222
-
-
Evfimievski, A.V.1
Gehrke, J.2
Srikant, R.3
-
44
-
-
1242331445
-
Privacy preserving mining of association rules
-
Evfimievski, A. V., Srikant, R., Agrawal, R., and Gehrke, J. 2004. Privacy preserving mining of association rules. Information Systems 29(4):343–364.
-
(2004)
Information Systems
, vol.29
, Issue.4
, pp. 343-364
-
-
Evfimievski, A.V.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
45
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Kargupta, H., Datta, S., Wang, Q., and Sivakumar, K. 2003. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the ICDM.
-
(2003)
Proceedings of the ICDM
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
46
-
-
29844458622
-
Deriving private information from randomized data
-
Huang, Z., Du, W., and Chen, B. 2005. Deriving private information from randomized data. In Proceedings of the SIGMOD Conference, pp. 37–48.
-
(2005)
Proceedings of the SIGMOD Conference
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
47
-
-
42149134082
-
Comparisons of k-anonymization and randomization schemes under linking attacks
-
Teng, Z., and Du, W. 2006. Comparisons of k-anonymization and randomization schemes under linking attacks. In Proceedings of the ICDM.
-
(2006)
Proceedings of the ICDM
-
-
Teng, Z.1
Du, W.2
-
48
-
-
33746437508
-
Privacy preserving data mining
-
Lindell, Y., and Pinkas, B. 2002. Privacy preserving data mining. Journal of Cryptology 15(3):177–206.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
50
-
-
4544361334
-
Privacy preserving data mining of association rules on horizontally partitioned data
-
Kantarcioglu, M., and Clifton, C. 2004. Privacy preserving data mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering 16(9):1026–1037.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
53
-
-
84880121624
-
Privacy-preserving classification of customer data without loss of accuracy
-
Yang, Z., Zhong, S., and Wright, R. N. 2005. Privacy-preserving classification of customer data without loss of accuracy. In Proceedings of SIAM SDM.
-
(2005)
Proceedings of SIAM SDM
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
54
-
-
77952332120
-
Privacy-preserving fc-means clustering over vertically partitioned data
-
Vaidya, J., and Clifton, C. 2003. Privacy-preserving fc-means clustering over vertically partitioned data. In Proceedings of SIGKDD.
-
(2003)
Proceedings of SIGKDD
-
-
Vaidya, J.1
Clifton, C.2
-
60
-
-
84990975367
-
Private-iye: A framework for privacy preserving data integration
-
Bhowmick, S. S., Gruenwald, L., Iwaihara, M., and Chatvichienchai, S. 2006. Private-iye: A framework for privacy preserving data integration. In Proceedings of the ICDE Worfcshops.
-
(2006)
Proceedings of the ICDE Worfcshops
-
-
Bhowmick, S.S.1
Gruenwald, L.2
Iwaihara, M.3
Chatvichienchai, S.4
-
61
-
-
35248886066
-
Mining multiple private databases using a knn classifier
-
Xiong, L., Chitti, S., and Liu, L. 2007. Mining multiple private databases using a knn classifier. In Proceedings of the ACM Symposium on Applied Computing (SAC), pp. 435–440.
-
(2007)
Proceedings of the ACM Symposium on Applied Computing (SAC)
, pp. 435-440
-
-
Xiong, L.1
Chitti, S.2
Liu, L.3
-
62
-
-
34548264581
-
Preserving data privacy for outsourcing data aggregation services
-
Xiong, L., Chitti, S., and Liu, L. 2007. Preserving data privacy for outsourcing data aggregation services. ACM Transactions on Internet Technology (TOIT) 7(3):17.
-
(2007)
ACM Transactions on Internet Technology (TOIT)
, vol.7
, Issue.3
, pp. 17
-
-
Xiong, L.1
Chitti, S.2
Liu, L.3
-
64
-
-
51849139562
-
Hide: An integrated system for health information de-identification
-
Gardner, J., and Xiong, L. 2008. HIDE: an integrated system for health information de-identification. In Proceedings of the IEEE CBMS.
-
(2008)
Proceedings of the IEEE CBMS
-
-
Gardner, J.1
Xiong, L.2
-
65
-
-
71749103414
-
An integrated framework for anonymizing unstructured medical data
-
Gardner, J., and Xiong, L. 2009. An integrated framework for anonymizing unstructured medical data. Data and Knowledge Engineering (DKE), in press. Available online at doi:10.1016/j.datak.2009.07.006.
-
(2009)
Data and Knowledge Engineering (DKE)
-
-
Gardner, J.1
Xiong, L.2
-
66
-
-
0034575782
-
Medical document anonymization with a semantic lexicon
-
Ruch, P., Baud, R. H., Rassinoux, A. M., Bouillon, P., and Robert, G. 2000. Medical document anonymization with a semantic lexicon. In Proceedings of the AMIA Symposium.
-
(2000)
Proceedings of The
-
-
Ruch, P.1
Baud, R.H.2
Rassinoux, A.M.3
Bouillon, P.4
Robert, G.5
-
67
-
-
0038580808
-
Concept-match medical data scrubbing: How pathology text can be used in research
-
Berman, J. J. 2003. Concept-match medical data scrubbing: how pathology text can be used in research. Archives of Pathology and Laboratory Medicine 127(66):680–686.
-
(2003)
Archives of Pathology and Laboratory Medicine
, vol.127
, Issue.66
, pp. 680-686
-
-
Berman, J.J.1
-
68
-
-
33847111256
-
De-identification algorithm for free-text nursing notes
-
Douglass, M., Clifford, G. D., Reisner, A., Long, W. J., Moody, G. B., and Mark, R. G. 2005. De-identification algorithm for free-text nursing notes. Computers in Cardiology 32:331–334.
-
(2005)
Computers in Cardiology
, vol.32
, pp. 331-334
-
-
Douglass, M.1
Clifford, G.D.2
Reisner, A.3
Long, W.J.4
Moody, G.B.5
Mark, R.G.6
-
71
-
-
23044454840
-
Secure multi-party computation. Working draft
-
Goldreich, O. 2001. Secure multi-party computation. Working Draft, Version 1.3.
-
(2001)
Version
, vol.1
, pp. 3
-
-
Goldreich, O.1
-
72
-
-
36048997303
-
A secure distributed framework for achieving k-anonymity
-
Jiang, W., and Clifton, C. 2006. A secure distributed framework for achieving k-anonymity. The VLDB Journal 15(4):316–333.
-
(2006)
The VLDB Journal
, vol.15
, Issue.4
, pp. 316-333
-
-
Jiang, W.1
Clifton, C.2
-
73
-
-
33244463520
-
Privacy-enhancing k-anonymization of customer data
-
New York, NY: ACM Press
-
Zhong, S., Yang, Z., and Wright, R. N. 2005. Privacy-enhancing k-anonymization of customer data. In Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 139–147. New York, NY: ACM Press.
-
(2005)
Proceedings of the 24Th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 139-147
-
-
Zhong, S.1
Yang, Z.2
Wright, R.N.3
-
76
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Clifton, C., Kantarcioglu, M., Lin, X., Vaidya, J., and Zhu, M. 2003. Tools for privacy preserving distributed data mining. In Proceedings of SIGKDD Explorations.
-
(2003)
Proceedings of SIGKDD Explorations
-
-
Clifton, C.1
Kantarcioglu, M.2
Lin, X.3
Vaidya, J.4
Zhu, M.5
-
78
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Melbourne, FL, November
-
Kargupta, H., Datta, S., Wang, Q., and Sivakumar, K. 2003. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the IEEE International Conference on Data Mining, p. 99, Melbourne, FL, November.
-
(2003)
Proceedings of the IEEE International Conference on Data Mining
, pp. 99
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
79
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
Liu, K., Kargupta, H., and Ryan, J. 2006. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering 18(1):92–106.
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
|