-
2
-
-
34250661905
-
Achieving anonymity via clustering
-
DOI 10.1145/1142351.1142374, Proceedings of the Twenty-Fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2006
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. In PODS, pages 153-162, New York, NY, USA, 2006. ACM. (Pubitemid 46946477)
-
(2006)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
DOI 10.1145/1242572.1242598, 16th International World Wide Web Conference, WWW2007
-
L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, pages 181-190, 2007. (Pubitemid 47591590)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
5
-
-
84993300473
-
Monitoring business processes with queries
-
VLDB Endowment
-
C. Beeri, A. Eyal, T. Milo, and A. Pilberg. Monitoring business processes with queries. In VLDB '07: Proceedings of the 33rd international conference on Very large data bases, pages 603-614. VLDB Endowment, 2007.
-
(2007)
VLDB '07: Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 603-614
-
-
Beeri, C.1
Eyal, A.2
Milo, T.3
Pilberg, A.4
-
6
-
-
85001786260
-
Secure and selective dissemination of XML documents
-
E. Bertino and E. Ferrari. Secure and selective dissemination of XML documents. ACM Trans. Inf. Syst. Secur., 5(3):290-331, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.3
, pp. 290-331
-
-
Bertino, E.1
Ferrari, E.2
-
7
-
-
52649110562
-
Querying and managing provenance through user views in scientific workflows
-
O. Biton, S. C. Boulakia, S. B. Davidson, and C. S. Hara. Querying and managing provenance through user views in scientific workflows. In ICDE, pages 1072-1081, 2008.
-
(2008)
ICDE
, pp. 1072-1081
-
-
Biton, O.1
Boulakia, S.C.2
Davidson, S.B.3
Hara, C.S.4
-
8
-
-
70349092258
-
Optimizing user views for workflows
-
O. Biton, S. B. Davidson, S. Khanna, and S. Roy. Optimizing user views for workflows. In ICDT '09: Proceedings of the 12th International Conference on Database Theory, pages 310-323, 2009.
-
(2009)
ICDT '09: Proceedings of the 12th International Conference on Database Theory
, pp. 310-323
-
-
Biton, O.1
Davidson, S.B.2
Khanna, S.3
Roy, S.4
-
10
-
-
85091898032
-
Securing provenance
-
USENIX HotSec Berkeley, CA, USA, July USENIX Association
-
U. Braun, A. Shinnar, and M. Seltzer. Securing provenance. In USENIX HotSec, The 3rd USENIX Workshop on Hot Topics in Security, USENIX HotSec, pages 1-5, Berkeley, CA, USA, July 2008. USENIX Association.
-
(2008)
USENIX HotSec, the 3rd USENIX Workshop on Hot Topics in Security
, pp. 1-5
-
-
Braun, U.1
Shinnar, A.2
Seltzer, M.3
-
11
-
-
51849083449
-
Scientific workflow provenance querying with security views
-
July
-
A. Chebotko, S. Chang, S. Lu, F. Fotouhi, and P. Yang. Scientific workflow provenance querying with security views. WAIM, pages 349-356, July 2008.
-
(2008)
WAIM
, pp. 349-356
-
-
Chebotko, A.1
Chang, S.2
Lu, S.3
Fotouhi, F.4
Yang, P.5
-
12
-
-
85001697848
-
A fine-grained access control system for XML documents
-
E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. A fine-grained access control system for XML documents. ACM Trans. Inf. Syst. Secur., 5(2):169-202, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
-
13
-
-
79952335640
-
-
Unpublished manuscript
-
S. Davidson, S. Khanna, T. Milo, D. Panigrahi, and S. Roy. Provenance views for module privacy. Unpublished manuscript, 2011.
-
(2011)
Provenance Views for Module Privacy
-
-
Davidson, S.1
Khanna, S.2
Milo, T.3
Panigrahi, D.4
Roy, S.5
-
16
-
-
1142275486
-
Revealing information while preserving privacy
-
New York, NY, USA ACM
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS '03: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 202-210, New York, NY, USA, 2003. ACM.
-
(2003)
PODS '03: Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
17
-
-
70349305273
-
Differential privacy: A survey of results
-
C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1-19, 2008.
-
(2008)
TAMC
, pp. 1-19
-
-
Dwork, C.1
-
18
-
-
70350645515
-
The differential privacy frontier (extended abstract)
-
C. Dwork. The differential privacy frontier (extended abstract). In TCC, pages 496-502, 2009.
-
(2009)
TCC
, pp. 496-502
-
-
Dwork, C.1
-
20
-
-
33750051947
-
Managing rapidly-evolving scientific workflows
-
Provenance and Annotation of Data - International Provenance and Annotation Workshop, IPAW 2006, Revised Selected Papers
-
J. Freire, C. T. Silva, S. P. Callahan, E. Santos, C. E. Scheidegger, and H. T. Vo. Managing rapidly-evolving scientific workflows. In IPAW, volume 4145 of LNCS, pages 10-18. Springer, 2006. (Pubitemid 44577302)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4145
, pp. 10-18
-
-
Freire, J.1
Silva, C.T.2
Callahan, S.P.3
Santos, E.4
Scheidegger, C.E.5
Vo, H.T.6
-
23
-
-
62749161358
-
Introducing secure provenance: Problems and challenges
-
New York, NY, USA ACM
-
R. Hasan, R. Sion, and M. Winslett. Introducing secure provenance: problems and challenges. In StorageSS '07, pages 13-18, New York, NY, USA, 2007. ACM.
-
(2007)
StorageSS '07
, pp. 13-18
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
25
-
-
35448950542
-
Identifying meaningful return information for XML keyword search
-
Z. Liu and Y. Chen. Identifying Meaningful Return Information for XML Keyword Search. In SIGMOD, 2007.
-
(2007)
SIGMOD
-
-
Liu, Z.1
Chen, Y.2
-
26
-
-
79952322120
-
Searching workflows with hierarchical views
-
Z. Liu, Q. Shao, and Y. Chen. Searching workflows with hierarchical views. PVLDB, 3(1), 2010.
-
(2010)
PVLDB
, vol.3
, Issue.1
-
-
Liu, Z.1
Shao, Q.2
Chen, Y.3
-
28
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1(1):3, 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
29
-
-
3142686877
-
A formal analysis of information disclosure in data exchange
-
G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, 2004.
-
(2004)
SIGMOD
-
-
Miklau, G.1
Suciu, D.2
-
30
-
-
84961817130
-
The open provenance model: An overview
-
L. Moreau, J. Freire, J. Futrelle, R. E. McGrath, J. Myers, and P. Paulson. The open provenance model: An overview. In IPAW, pages 323-326, 2008.
-
(2008)
IPAW
, pp. 323-326
-
-
Moreau, L.1
Freire, J.2
Futrelle, J.3
McGrath, R.E.4
Myers, J.5
Paulson, P.6
-
32
-
-
85169252862
-
-
myExperiment. http://www.myexperiment.org/workflows.
-
-
-
-
33
-
-
10244255212
-
Taverna: A tool for the composition and enactment of bioinformatics workflows
-
DOI 10.1093/bioinformatics/bth361
-
T. Oinn, M. Addis, J. Ferris, D. Marvin, M. Senger, R. Greenwood, K. Carver, M. G. Pocock, A. Wipat, and P. Li. Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics, 20(1):3045-3054, 2003. (Pubitemid 39619196)
-
(2004)
Bioinformatics
, vol.20
, Issue.17
, pp. 3045-3054
-
-
Oinn, T.1
Addis, M.2
Ferris, J.3
Marvin, D.4
Senger, M.5
Greenwood, M.6
Carver, T.7
Glover, K.8
Pocock, M.R.9
Wipat, A.10
Li, P.11
-
35
-
-
70350635777
-
Relationship privacy: Output perturbation for queries with joins
-
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107-116, 2009.
-
(2009)
PODS
, pp. 107-116
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
36
-
-
77953220843
-
Privacy by design: Moving from art to practice
-
S. S. Shapiro. Privacy by design: moving from art to practice. Commun. ACM, 53(6):27-29, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.6
, pp. 27-29
-
-
Shapiro, S.S.1
-
37
-
-
38849089496
-
MutaGeneSys: Estimating individual disease susceptibility based on genome-wide SNP array data
-
DOI 10.1093/bioinformatics/btm587
-
J. Stoyanovich and I. Pe'er. MutaGeneSys: estimating individual disease susceptibility based on genome-wide SNP array data. Bioinformatics, 24(3):440-442, 2008. (Pubitemid 351189027)
-
(2008)
Bioinformatics
, vol.24
, Issue.3
, pp. 440-442
-
-
Stoyanovich, J.1
Pe'er, I.2
-
38
-
-
70849121002
-
Detecting and resolving unsound workflow views for correct provenance analysis
-
New York, NY, USA ACM
-
P. Sun, Z. Liu, S. B. Davidson, and Y. Chen. Detecting and resolving unsound workflow views for correct provenance analysis. In SIGMOD '09: Proceedings of the 35th SIGMOD international conference on Management of data, pages 549-562, New York, NY, USA, 2009. ACM.
-
(2009)
SIGMOD '09: Proceedings of the 35th SIGMOD International Conference on Management of Data
, pp. 549-562
-
-
Sun, P.1
Liu, Z.2
Davidson, S.B.3
Chen, Y.4
-
40
-
-
79951848895
-
The triana workflow environment: Architecture and applications
-
I. Taylor, E. Deelman, D. Gannon, and M. Shields, editors Springer, New York
-
I. Taylor, M. Shields, I. Wang, and A. Harrison. The Triana Workflow Environment: Architecture and Applications. In I. Taylor, E. Deelman, D. Gannon, and M. Shields, editors, Workflows for e-Science, pages 320-339. Springer, New York, 2007.
-
(2007)
Workflows for E-science
, pp. 320-339
-
-
Taylor, I.1
Shields, M.2
Wang, I.3
Harrison, A.4
-
41
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
DOI 10.1145/974121.974131
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. SIGMOD Rec., 33(1):50-57, 2004. (Pubitemid 40290240)
-
(2004)
SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
|