-
4
-
-
38049126170
-
Efficient k-anonymity using clustering technique
-
J. Byun, A. Kamra, E. Bertino, and N. Li. Efficient k-anonymity using clustering technique. In DASFAA, pages 188-200, 2007.
-
(2007)
DASFAA
, pp. 188-200
-
-
Byun, J.1
Kamra, A.2
Bertino, E.3
Li, N.4
-
5
-
-
79956041471
-
Rho-uncertainty: Inference-proof transaction anonymization
-
J. Cao, P. Karras, C. Raïssi, and K. Tan. rho-uncertainty: Inference-proof transaction anonymization. PVLDB, 3(1):1033-1044, 2010.
-
(2010)
PVLDB
, vol.3
, Issue.1
, pp. 1033-1044
-
-
Cao, J.1
Karras, P.2
Raïssi, C.3
Tan, K.4
-
6
-
-
77954475442
-
Towards publishing recommendation data with predictive anonymization
-
C.-C. Chang, B. Thompson, H. Wang, and D. Yao. Towards publishing recommendation data with predictive anonymization. In 5th ACM Symposium on Information, Computer and Communications Security, pages 24-35, 2010.
-
(2010)
5th ACM Symposium on Information, Computer and Communications Security
, pp. 24-35
-
-
Chang, C.-C.1
Thompson, B.2
Wang, H.3
Yao, D.4
-
7
-
-
77954718437
-
Privacy-preserving data publishing
-
B. Chen, D. Kifer, K. LeFevre, and A. Machanavajjhala. Privacy-preserving data publishing. Found. Trends databases, 2(1-2):1-167, 2009.
-
(2009)
Found. Trends Databases
, vol.2
, Issue.1-2
, pp. 1-167
-
-
Chen, B.1
Kifer, D.2
LeFevre, K.3
Machanavajjhala, A.4
-
8
-
-
26944448516
-
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
-
DOI 10.1007/s10618-005-0007-5
-
J. Domingo-Ferrer and V. Torra. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. DMKD, 11(2):195-212, 2005. (Pubitemid 41476765)
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
9
-
-
77951201056
-
Privacy-preserving data publishing: A survey on recent developments
-
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey on recent developments. ACM Comput. Surv., 42, 2010.
-
ACM Comput. Surv.
, vol.42
, pp. 2010
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
11
-
-
52649106883
-
On the anonymization of sparse high-dimensional data
-
G. Ghinita, Y. Tao, and P. Kalnis. On the anonymization of sparse high-dimensional data. In ICDE, pages 715-724, 2008.
-
(2008)
ICDE
, pp. 715-724
-
-
Ghinita, G.1
Tao, Y.2
Kalnis, P.3
-
12
-
-
52949107266
-
A free terrain model for trajectory k-anonymity
-
A. Gkoulalas-Divanis and V. Verykios. A free terrain model for trajectory k-anonymity. In DEXA, pages 49-56, 2008.
-
(2008)
DEXA
, pp. 49-56
-
-
Gkoulalas-Divanis, A.1
Verykios, V.2
-
14
-
-
78049372159
-
Anonymization of set-valued data via top-down, local generalization
-
Y. He and J. F. Naughton. Anonymization of set-valued data via top-down, local generalization. PVLDB, 2(1):934-945, 2009.
-
(2009)
PVLDB
, vol.2
, Issue.1
, pp. 934-945
-
-
He, Y.1
Naughton, J.F.2
-
15
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. S. Iyengar. Transforming data to satisfy privacy constraints. In KDD, pages 279-288, 2002.
-
(2002)
KDD
, pp. 279-288
-
-
Iyengar, V.S.1
-
16
-
-
33646017451
-
Privacy preserving clustering
-
S. Jha, L. Kruger, and P. McDaniel. Privacy preserving clustering. In ESORICS, pages 397-417, 2005.
-
(2005)
ESORICS
, pp. 397-417
-
-
Jha, S.1
Kruger, L.2
McDaniel, P.3
-
17
-
-
76749111694
-
Efficient multidimensional suppression for k-anonymity
-
S. Kisilevich, L. Rokach, Y. Elovici, and B. Shapira. Efficient multidimensional suppression for k-anonymity. TKDE, 22:334-347, 2010.
-
(2010)
TKDE
, vol.22
, pp. 334-347
-
-
Kisilevich, S.1
Rokach, L.2
Elovici, Y.3
Shapira, B.4
-
18
-
-
33749606641
-
Mondrian multidimensional K-anonymity
-
DOI 10.1109/ICDE.2006.101, 1617393, Proceedings of the 22nd International Conference on Data Engineering, ICDE '06
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In ICDE, page 25, 2006. (Pubitemid 44539817)
-
(2006)
Proceedings - International Conference on Data Engineering
, vol.2006
, pp. 25
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
19
-
-
33751359260
-
Achieving k-anonymity by clustering in attribute hierarchical structures
-
Data Warehousing and Knowledge Discovery - 8th International Conference, DaWaK 2006, Proceedings
-
J. Li, R. Wong, A. Fu, and J. Pei. Achieving -anonymity by clustering in attribute hierarchical structures. In DaWaK, pages 405-416, 2006. (Pubitemid 44811914)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4081 LNCS
, pp. 405-416
-
-
Jiuyong, L.1
Wong, R.C.-W.2
Fu, A.W.-C.3
Jian, P.4
-
20
-
-
57149126815
-
Towards identity anonymization on graphs
-
K. Liu and E. Terzi. Towards identity anonymization on graphs. In 2008 SIGMOD, pages 93-106, 2008.
-
(2008)
2008 SIGMOD
, pp. 93-106
-
-
Liu, K.1
Terzi, E.2
-
21
-
-
84864258789
-
Coat: Constraint-based anonymization of transactions
-
To Appear
-
G. Loukides, A. Gkoulalas-Divanis, and B. Malin. COAT: COnstraint-based Anonymization of Transactions. KAIS. To Appear.
-
KAIS
-
-
Loukides, G.1
Gkoulalas-Divanis, A.2
Malin, B.3
-
22
-
-
77952390550
-
Anonymization of electronic medical records for validating genome-wide association studies
-
G. Loukides, A. Gkoulalas-Divanis, and B. Malin. Anonymization of electronic medical records for validating genome-wide association studies. PNAS, 17:7898-7903, 2010.
-
(2010)
PNAS
, vol.17
, pp. 7898-7903
-
-
Loukides, G.1
Gkoulalas-Divanis, A.2
Malin, B.3
-
23
-
-
78049360732
-
Anonymizing transaction data to eliminate sensitive inferences
-
G. Loukides, A. Gkoulalas-Divanis, and J. Shao. Anonymizing transaction data to eliminate sensitive inferences. In DEXA, pages 400-415, 2010.
-
(2010)
DEXA
, pp. 400-415
-
-
Loukides, G.1
Gkoulalas-Divanis, A.2
Shao, J.3
-
24
-
-
35248900307
-
Capturing data usefulness and privacy protection in K-anonymisation
-
DOI 10.1145/1244002.1244091, Proceedings of the 2007 ACM Symposium on Applied Computing
-
G. Loukides and J. Shao. Capturing data usefulness and privacy protection in k-anonymisation. In SAC, pages 370-374, 2007. (Pubitemid 47568317)
-
(2007)
Proceedings of the ACM Symposium on Applied Computing
, pp. 370-374
-
-
Loukides, G.1
Shao, J.2
-
25
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In IEEE S&P, pages 111-125, 2008.
-
(2008)
IEEE S&P
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
26
-
-
34548689125
-
Thoughts on k-anonymization
-
DOI 10.1016/j.datak.2007.03.009, PII S0169023X07000468
-
M. E. Nergiz and C. Clifton. Thoughts on k-anonymization. DKE, 63(3):622-645, 2007. (Pubitemid 47418332)
-
(2007)
Data and Knowledge Engineering
, vol.63
, Issue.3
, pp. 622-645
-
-
Nergiz, M.E.1
Clifton, C.2
-
29
-
-
1142294784
-
Maintaining data privacy in association rule mining
-
S. J. Rizvi and J. R. Haritsa. Maintaining data privacy in association rule mining. In VLDB, pages 682-693, 2002.
-
(2002)
VLDB
, pp. 682-693
-
-
Rizvi, S.J.1
Haritsa, J.R.2
-
32
-
-
84886640241
-
Local and global recoding methods for anonymizing set-valued data
-
To appear
-
M. Terrovitis, N. Mamoulis, and P. Kalnis. Local and global recoding methods for anonymizing set-valued data. VLDB J. To appear.
-
VLDB J
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
33
-
-
84859177489
-
Privacy-preserving anonymization of set-valued data
-
M. Terrovitis, N. Mamoulis, and P. Kalnis. Privacy-preserving anonymization of set-valued data. PVLDB, 1(1):115-125, 2008.
-
(2008)
PVLDB
, vol.1
, Issue.1
, pp. 115-125
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
34
-
-
67650222865
-
Privacy and security in spatiotemporal data and trajectories
-
chapter 8, Mobility, Springer
-
V. S. Verykios, M. L. Damiani, and A. Gkoulalas-Divanis. Privacy and Security in Spatiotemporal Data and Trajectories, chapter 8, pages 213-240. Mobility, Data Mining and Privacy: Geographic Knowledge Discovery. Springer, 2008.
-
(2008)
Data Mining and Privacy: Geographic Knowledge Discovery
, pp. 213-240
-
-
Verykios, V.S.1
Damiani, M.L.2
Gkoulalas-Divanis, A.3
-
35
-
-
33749582207
-
Utility-based anonymization using local recoding
-
KDD 2006: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu. Utility-based anonymization using local recoding. In KDD, pages 785-790, 2006. (Pubitemid 44535591)
-
(2006)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, vol.2006
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.-C.6
-
37
-
-
65449148368
-
Anonymizing transaction databases for publication
-
Y. Xu, K. Wang, A. W.-C. Fu, and P. S. Yu. Anonymizing transaction databases for publication. In KDD, pages 767-775, 2008.
-
(2008)
KDD
, pp. 767-775
-
-
Xu, Y.1
Wang, K.2
Fu, A.W.-C.3
Yu, P.S.4
-
38
-
-
0035788918
-
Real world performance of association rule algorithms
-
Z. Zheng, R. Kohavi, and L. Mason. Real world performance of association rule algorithms. In KDD, pages 401-406, 2001.
-
(2001)
KDD
, pp. 401-406
-
-
Zheng, Z.1
Kohavi, R.2
Mason, L.3
|