-
1
-
-
79960158684
-
-
www.myexperiment.org.
-
-
-
-
3
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
DOI 10.1145/1242572.1242598, 16th International World Wide Web Conference, WWW2007
-
L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, pages 181-190, 2007. (Pubitemid 47591590)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
6
-
-
51849083449
-
Scientific workflow provenance querying with security views
-
A. Chebotko, S. Chang, S. Lu, F. Fotouhi, and P. Yang. Scientific workflow provenance querying with security views. In WAIM, pages 349-356, 2008.
-
(2008)
WAIM
, pp. 349-356
-
-
Chebotko, A.1
Chang, S.2
Lu, S.3
Fotouhi, F.4
Yang, P.5
-
7
-
-
80053465114
-
Enabling privacy in provenance-aware workflow systems
-
S. B. Davidson, S. Khanna, S. Roy, J. Stoyanovich, V. Tannen, Y. Chen, and T. Milo. Enabling privacy in provenance-aware workflow systems. In CIDR, 2011.
-
(2011)
CIDR
-
-
Davidson, S.B.1
Khanna, S.2
Roy, S.3
Stoyanovich, J.4
Tannen, V.5
Chen, Y.6
Milo, T.7
-
8
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
9
-
-
70349305273
-
Differential privacy: A survey of results
-
C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1-19, 2008.
-
(2008)
TAMC
, pp. 1-19
-
-
Dwork, C.1
-
10
-
-
33750051947
-
Managing rapidly-evolving scientific workflows
-
Provenance and Annotation of Data - International Provenance and Annotation Workshop, IPAW 2006, Revised Selected Papers
-
J. Freire, C. T. Silva, S. P. Callahan, E. Santos, C. E. Scheidegger, and H. T. Vo. Managing rapidly-evolving scientific workflows. In IPAW, pages 10-18, 2006. (Pubitemid 44577302)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4145
, pp. 10-18
-
-
Freire, J.1
Silva, C.T.2
Callahan, S.P.3
Santos, E.4
Scheidegger, C.E.5
Vo, H.T.6
-
12
-
-
77955877886
-
Reasoning about the appropriate use of private data through computational workflows
-
Y. Gil and C. Fritz. Reasoning about the appropriate use of private data through computational workflows. In Intelligent Information Privacy Management, pages 69-74, 2010.
-
(2010)
Intelligent Information Privacy Management
, pp. 69-74
-
-
Gil, Y.1
Fritz, C.2
-
13
-
-
62749161358
-
Introducing secure provenance: Problems and challenges
-
R. Hasan, R. Sion, and M. Winslett. Introducing secure provenance: problems and challenges. In StorageSS, pages 13-18, 2007.
-
(2007)
StorageSS
, pp. 13-18
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
14
-
-
84863142886
-
Trusted computing and provenance: Better together
-
J. Lyle and A. Martin. Trusted computing and provenance: better together. In TAPP, page 1, 2010.
-
(2010)
TAPP
, pp. 1
-
-
Lyle, J.1
Martin, A.2
-
15
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In ICDE, page 24, 2006.
-
(2006)
ICDE
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
16
-
-
3142686877
-
A formal analysis of information disclosure in data exchange
-
G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, pages 575-586, 2004.
-
(2004)
SIGMOD
, pp. 575-586
-
-
Miklau, G.1
Suciu, D.2
-
17
-
-
84961817130
-
The open provenance model: An overview
-
L. Moreau, J. Freire, J. Futrelle, R. E. McGrath, J. Myers, and P. Paulson. The open provenance model: An overview. In IPAW, pages 323-326, 2008.
-
(2008)
IPAW
, pp. 323-326
-
-
Moreau, L.1
Freire, J.2
Futrelle, J.3
McGrath, R.E.4
Myers, J.5
Paulson, P.6
-
19
-
-
10244255212
-
Taverna: A tool for the composition and enactment of bioinformatics workflows
-
T.'Oinn et al. Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics, 20(1):3045-3054, 2003.
-
(2003)
Bioinformatics
, vol.20
, Issue.1
, pp. 3045-3054
-
-
-
20
-
-
70350635777
-
Relationship privacy: Output perturbation for queries with joins
-
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107-116, 2009.
-
(2009)
PODS
, pp. 107-116
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
22
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
DOI 10.1145/974121.974131
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. SIGMOD Rec., 33(1):50-57, 2004. (Pubitemid 40290240)
-
(2004)
SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
|