-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. R. Adam and J. C. Wortmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21(4):515–556, 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
2
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
Dakshi Agrawal and Charu C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In PODS, 2001.
-
(2001)
PODS
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
3
-
-
0041783510
-
Privacy-preserving data mining
-
Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. In SIGMOD Conference, pages 439–450, 2000.
-
(2000)
SIGMOD Conference
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
0019056889
-
Beck. A security mechanism for statistical databases
-
Leland L. Beck. A security mechanism for statistical databases. ACM Trans. Database Syst., 5(3):316–338, 1980.
-
(1980)
ACM Trans. Database Syst
, vol.5
, Issue.3
, pp. 316-338
-
-
Leland, L.1
-
5
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
Alexander Brodsky, Csilla Farkas, and Sushil Jajodia. Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng., 12(6):900–919, 2000.
-
(2000)
IEEE Trans. Knowl. Data Eng
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
6
-
-
0002084144
-
An algorithm to calculate the lower and upper bounds of the elements of an array given its marginals
-
L. Buzzigoli and A. Giusti. An algorithm to calculate the lower and upper bounds of the elements of an array given its marginals. In Proceedings of the conference for statistical data protection, pages 131–147, 1999.
-
(1999)
Proceedings of the Conference for Statistical Data Protection
, pp. 131-147
-
-
Buzzigoli, L.1
Giusti, A.2
-
8
-
-
33750283449
-
Privacy preserving data classification with rotation perturbation
-
Keke Chen and Ling Liu. Privacy preserving data classification with rotation perturbation. In ICDM, pages 589–592, 2005.
-
(2005)
ICDM, Pages 589–592
-
-
Chen, K.1
Liu, L.2
-
10
-
-
0020205885
-
Auditing and inference control in statistical databases
-
Francis Y. L. Chin and Gultekin Özsoyoglu. Auditing and inference control in statistical databases. IEEE Trans. Software Eng., 8(6):574–582, 1982.
-
(1982)
IEEE Trans. Software Eng
, vol.8
, Issue.6
, pp. 574-582
-
-
Chin, F.Y.L.1
Özsoyoglu, G.2
-
11
-
-
0033349024
-
Disclosure detection in multivariate categorical databases: Auditing confidentiality protection through two new matrix operators
-
S. Chowdhury, G. Duncan, R. Krishnan, S. Roehrig, and S. Mukherjee. Disclosure detection in multivariate categorical databases: auditing confidentiality protection through two new matrix operators. Management Sciences, 45:1710–1723, 1999.
-
(1999)
Management Sciences
, vol.45
, pp. 1710-1723
-
-
Chowdhury, S.1
Duncan, G.2
Krishnan, R.3
Roehrig, S.4
Mukherjee, S.5
-
12
-
-
84969367319
-
Bounding entries in 3-dimensional contingency tables
-
L. Cox. Bounding entries in 3-dimensional contingency tables. In SDC: From Theory to Practice, 2001. http://vneumann.etse.urv.es/amrads/papers/coxlux.pdf.
-
(2001)
SDC: From Theory to Practice
-
-
Cox, L.1
-
13
-
-
0042384761
-
On properties of multi-dimensional statistical tables
-
L. Cox. On properties of multi-dimensional statistical tables. Journal of Statistical Planning and Inference, 117(2):251–273, 2003.
-
(2003)
Journal of Statistical Planning and Inference
, vol.117
, Issue.2
, pp. 251-273
-
-
Cox, L.1
-
14
-
-
0000082189
-
Suppression methodology and statistical disclosure control
-
L. H. Cox. Suppression methodology and statistical disclosure control. Journal of American Statistical Association, 75:377–385, 1980.
-
(1980)
Journal of American Statistical Association
, vol.75
, pp. 377-385
-
-
Cox, L.H.1
-
15
-
-
0001445186
-
A constructive procedure for unbiased controlled rounding
-
L. H. Cox. A constructive procedure for unbiased controlled rounding. Journal of the American Statistical Association, 82:520–524, 1987.
-
(1987)
Journal of the American Statistical Association
, vol.82
, pp. 520-524
-
-
Cox, L.H.1
-
16
-
-
0042251080
-
Controlled rounding for tables with subtotals
-
L. H. Cox and J. A. George. Controlled rounding for tables with subtotals. Annuals of operations research, 20(1-4):141–157, 1989.
-
(1989)
Annuals of Operations Research
, vol.20
, Issue.1-4
, pp. 141-157
-
-
Cox, L.H.1
George, J.A.2
-
19
-
-
0020779363
-
Inference controls for statistical databases
-
D. E. Denning and J. Schlorer. Inference controls for statistical databases. IEEE Computer, 16(7):69–82, 1983.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.E.1
Schlorer, J.2
-
20
-
-
0018444418
-
Secure databases: Protection against user influence
-
David P. Dobkin, Anita K. Jones, and Richard J. Lipton. Secure databases: Protection against user influence. ACM Trans. Database Syst., 4(1):97–106, 1979.
-
(1979)
ACM Trans. Database Syst
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin, D.P.1
Jones, A.K.2
Lipton, R.J.3
-
22
-
-
0035694218
-
Bounds for cell entries in contingency tables induced by fixed marginal totals with applications to disclosure limitation
-
A. Dobra and S. E. Fienberg. Bounds for cell entries in contingency tables induced by fixed marginal totals with applications to disclosure limitation. Statistical journal of the united states, 18:363–371, 2001.
-
(2001)
Statistical Journal of the United States
, vol.18
, pp. 363-371
-
-
Dobra, A.1
Fienberg, S.E.2
-
23
-
-
0347432366
-
Preserving confidentiality of high-dimensional tabulated data: Statistical and computational issues
-
A. Dobra, A. Karr, and A. Sanil. Preserving confidentiality of high-dimensional tabulated data: Statistical and computational issues. Statistics and Computing, 13:363–370, 2003.
-
(2003)
Statistics and Computing
, vol.13
, pp. 363-370
-
-
Dobra, A.1
Karr, A.2
Sanil, A.3
-
24
-
-
84949438251
-
Advances in inference control in statistical databases: An overview
-
Josep Domingo-Ferrer. Advances in inference control in statistical databases: An overview. In Inference Control in Statistical Databases, pages 1–7, 2002.
-
(2002)
Inference Control in Statistical Databases
, pp. 1-7
-
-
Domingo-Ferrer, J.1
-
25
-
-
0036190566
-
Practical data-oriented microaggregation for statistical disclosure control
-
Josep Domingo-Ferrer and Josep Maria Mateo-Sanz. Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng., 14(1):189–201, 2002.
-
(2002)
IEEE Trans. Knowl. Data Eng
, vol.14
, Issue.1
, pp. 189-201
-
-
Domingo-Ferrer, J.1
Mateo-Sanz, J.M.2
-
26
-
-
12244265258
-
The inference problem: A survey
-
Csilla Farkas and Sushil Jajodia. The inference problem: A survey. SIGKDD Explorations, 4(2):6–11, 2002.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
27
-
-
0035410523
-
Solving the cell suppression problem on tabular data with linear constraints
-
M. Fischetti and J. Salazar. Solving the cell suppression problem on tabular data with linear constraints. Management sciences, 47(7):1008–1027, 2001.
-
(2001)
Management Sciences
, vol.47
, Issue.7
, pp. 1008-1027
-
-
Fischetti, M.1
Salazar, J.2
-
28
-
-
0035410523
-
Solving the cell suppression problem on tabular data with linear constraints
-
M. Fischetti and J. J. Salazar. Solving the cell suppression problem on tabular data with linear constraints. Management Sciences, 47:1008–1026, 2000.
-
(2000)
Management Sciences
, vol.47
, pp. 1008-1026
-
-
Fischetti, M.1
Salazar, J.J.2
-
29
-
-
0345832325
-
Partial cell suppression: A new methodology for statistical disclosure control
-
M. Fischetti and J. J. Salazar. Partial cell suppression: a new methodology for statistical disclosure control. Statistics and Computing, 13:13–21, 2003.
-
(2003)
Statistics and Computing
, vol.13
, pp. 13-21
-
-
Fischetti, M.1
Salazar, J.J.2
-
30
-
-
29844458622
-
Deriving private information from randomized data
-
Zhengli Huang, Wenliang Du, and Biao Chen. Deriving private information from randomized data. In SIGMOD Conference, pages 37–48, 2005.
-
(2005)
SIGMOD Conference
, pp. 37-48
-
-
Huang, Z.1
Wenliang, D.2
Chen, B.3
-
31
-
-
0242625276
-
Iyengar. Transforming data to satisfy privacy constraints
-
Vijay S. Iyengar. Transforming data to satisfy privacy constraints. In KDD, pages 279–288, 2002.
-
(2002)
KDD
, pp. 279-288
-
-
Vijay, S.1
-
32
-
-
78149340011
-
QiWang, and Krishnamoorthy Sivakumar. On the privacy preserving properties of random data perturbation techniques
-
Hillol Kargupta, Souptik Datta, QiWang, and Krishnamoorthy Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM, pages 99–106, 2003.
-
(2003)
ICDM
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
-
34
-
-
84957800404
-
Preventing interval-based inference by random data perturbation
-
Yingjiu Li, Lingyu Wang, and Sushil Jajodia. Preventing interval-based inference by random data perturbation. In Privacy Enhancing Technologies, pages 160–170, 2002.
-
(2002)
Privacy Enhancing Technologies
, pp. 160-170
-
-
Li, Y.1
Wang, L.2
Jajodia, S.3
-
35
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
Kun Liu, Hillol Kargupta, and Jessica Ryan. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng., 18(1):92–106, 2006.
-
(2006)
IEEE Trans. Knowl. Data Eng
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
36
-
-
0033207750
-
A general aditive data perturbation method for database security
-
K. Muralidhar and R. Sarathy. A general aditive data perturbation method for database security. Management Sciences, 45:1399–1415, 2002.
-
(2002)
Management Sciences
, vol.45
, pp. 1399-1415
-
-
Muralidhar, K.1
Sarathy, R.2
-
38
-
-
0019546487
-
Security of statistical databases: Multidimensional transformation
-
Jan Schlörer. Security of statistical databases: Multidimensional transformation. ACM Trans. Database Syst., 6(1):95–112, 1981.
-
(1981)
ACM Trans. Database Syst
, vol.6
, Issue.1
, pp. 95-112
-
-
Schlörer, J.1
-
39
-
-
0020798007
-
Information loss in partitioned statistical databases
-
Jan Schlörer. Information loss in partitioned statistical databases. Comput. J., 26(3):218–223, 1983.
-
(1983)
Comput. J
, vol.26
, Issue.3
, pp. 218-223
-
-
Schlörer, J.1
-
40
-
-
84958980640
-
-
John von Neumann Lectures 2003 at the Technical University München
-
Bernd Sturmfels. Week 1: Two-way contingency tables, 2003. John von Neumann Lectures 2003 at the Technical University München. http://wwwm10.mathematik.tu-muenchen.de/neumann/lecturenotes/neumannweek1.pdf.
-
(2003)
Week 1: Two-Way Contingency Tables
-
-
Sturmfels, B.1
-
42
-
-
0021622802
-
The statistical security of a statistical database
-
J. F. Traub, Yechiam Yemini, and Henryk Wozniakowski. The statistical security of a statistical database. ACM Trans. Database Syst., 9(4):672–679, 1984.
-
(1984)
ACM Trans. Database Syst
, vol.9
, Issue.4
, pp. 672-679
-
-
Traub, J.F.1
Yemini, Y.2
Wozniakowski, H.3
-
43
-
-
19544380211
-
Bottom-up generalization: A data mining solution to privacy protection
-
Ke Wang, Philip S. Yu, and Sourav Chakraborty. Bottom-up generalization: A data mining solution to privacy protection. In ICDM, pages 249–256, 2004.
-
(2004)
ICDM
, pp. 249-256
-
-
Ke, W.1
Philip, S.Y.2
Chakraborty, S.3
-
45
-
-
0142219258
-
Precisely answering multi-dimensional range queries without privacy breaches
-
Lingyu Wang, Yingjiu Li, Duminda Wijesekera, and Sushil Jajodia. Precisely answering multi-dimensional range queries without privacy breaches. In ESORICS, pages 100–115, 2003.
-
(2003)
ESORICS
, pp. 100-115
-
-
Wang, L.1
Li, Y.2
Wijesekera, D.3
Jajodia, S.4
-
47
-
-
33745599656
-
Checking for k-anonymity violation by views
-
Chao Yao, Xiaoyang Sean Wang, and Sushil Jajodia. Checking for k-anonymity violation by views. In VLDB, pages 910–921, 2005.
-
(2005)
VLDB
, pp. 910-921
-
-
Yao, C.1
Wang, X.S.2
Jajodia, S.3
|