-
1
-
-
0024914229
-
Security control methods for statistical databases
-
Adam N. R., Wortman J. C.: Security control methods for statistical databases. ACM Comput. Surv. 21(4), 515-556 (1989).
-
(1989)
ACM Comput. Surv.
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortman, J.C.2
-
3
-
-
1142303699
-
Information sharing across private databases
-
San Diego, CA
-
Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proceedings of ACM SIGMOD, San Diego, CA (2003).
-
(2003)
Proceedings of ACM SIGMOD
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
5
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
Bayardo, R. J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE (2005).
-
(2005)
ICDE
-
-
Bayardo, R.J.1
Agrawal, R.2
-
6
-
-
33244468835
-
Practical privacy: the SuLQ framework
-
Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the SuLQ framework. In: PODS (2005).
-
(2005)
PODS
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
7
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
Brodsky A., Farkas C., Jajodia S.: Secure databases: Constraints, inference channels, and monitoring disclosures. IEEE Trans. Knowl. Data Eng. 12, 900-919 (2000).
-
(2000)
IEEE Trans. Knowl. Data Eng.
, vol.12
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
8
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Clifton C., Kantarcioglu M., Vaidya J., Lin X., Zhu M. Y.: Tools for privacy preserving distributed data mining. ACM SIGKDD Explor. Newsl. 4(2), 28-34 (2002).
-
(2002)
ACM SIGKDD Explor. Newsl.
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
9
-
-
0021519434
-
View definition and generalization for database integration in a multidatabase systems
-
Dayal U., Hwang H. Y.: View definition and generalization for database integration in a multidatabase systems. IEEE Trans. Softw. Eng. 10(6), 628-645 (1984).
-
(1984)
IEEE Trans. Softw. Eng.
, vol.10
, Issue.6
, pp. 628-645
-
-
Dayal, U.1
Hwang, H.Y.2
-
10
-
-
0020779363
-
Inference controls for statistical databases
-
Denning D., Schlorer J.: Inference controls for statistical databases. IEEE Comput. 16(7), 69-82 (1983).
-
(1983)
IEEE Comput.
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.1
Schlorer, J.2
-
11
-
-
1142275486
-
Revealing information while preserving privacy
-
Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: PODS (2003).
-
(2003)
PODS
-
-
Dinur, I.1
Nissim, K.2
-
13
-
-
2942529194
-
Privacy-preserving multivariate statistical analysis: linear regression and classification
-
Du, W., Han, Y. S., Chen, S.: Privacy-preserving multivariate statistical analysis: linear regression and classification. In: Proceedings of the SIAM International Conference on Data Mining (SDM), Florida (2004).
-
(2004)
Proceedings of the SIAM International Conference on Data Mining (SDM), Florida
-
-
Du, W.1
Han, Y.S.2
Chen, S.3
-
14
-
-
50249086141
-
Differential privacy
-
Dwork, C.: Differential privacy. In: ICALP (2006).
-
(2006)
ICALP
-
-
Dwork, C.1
-
15
-
-
33746086554
-
Calibrating noise to sensitivity in private data analysis
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: TCC (2006).
-
(2006)
TCC
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
17
-
-
34047165799
-
Anonymizing classification data for privacy preservation
-
Fung B. C. M., Wang K., Yu P. S.: Anonymizing classification data for privacy preservation. IEEE TKDE 19(5), 711-725 (2007).
-
(2007)
IEEE TKDE
, vol.19
, Issue.5
, pp. 711-725
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
18
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
Fung B. C. M., Wang K., Chen R., Yu P. S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42(4), 14: 1-14: 53 (2010).
-
(2010)
ACM Comput. Surv.
, vol.42
, Issue.4
, pp. 1-53
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
19
-
-
0023861339
-
Inference aggregation detection in database management systems
-
Hinke, T.: Inference aggregation detection in database management systems. In: IEEE S& P (1988).
-
(1988)
IEEE S& P
-
-
Hinke, T.1
-
20
-
-
52649087713
-
A hybrid approach to private record linkage
-
Inan, A., Kantarcioglu, M., Bertino, E., Scannapieco, M.: A hybrid approach to private record linkage. In: Proceedings of the Int'l Conference on Data Engineering (2008).
-
(2008)
Proceedings of the Int'l Conference on Data Engineering
-
-
Inan, A.1
Kantarcioglu, M.2
Bertino, E.3
Scannapieco, M.4
-
21
-
-
77952279809
-
Private record matching using differential privacy
-
Inan, A., Kantarcioglu, M., Ghinita, G., Bertino, E.: Private record matching using differential privacy. In: Proceedings of the EDBT (2010).
-
(2010)
Proceedings of the EDBT
-
-
Inan, A.1
Kantarcioglu, M.2
Ghinita, G.3
Bertino, E.4
-
22
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Iyengar, V. S.: Transforming data to satisfy privacy constraints. In: SIGKDD (2002).
-
(2002)
SIGKDD
-
-
Iyengar, V.S.1
-
23
-
-
70849119921
-
Privacy-preserving distributed k-anonymity
-
Jiang, W., Clifton, C.: Privacy-preserving distributed k-anonymity. In: BDSec (2005).
-
(2005)
BDSec
-
-
Jiang, W.1
Clifton, C.2
-
24
-
-
36048997303
-
A secure distributed framework for achieving k-anonymity
-
Jiang W., Clifton C.: A secure distributed framework for achieving k-anonymity. Very Large Data Bases J. (VLDBJ) 15(4), 316-333 (2006).
-
(2006)
Very Large Data Bases J. (VLDBJ)
, vol.15
, Issue.4
, pp. 316-333
-
-
Jiang, W.1
Clifton, C.2
-
25
-
-
39749130001
-
Transforming semi-honest protocols to ensure accountability
-
Jiang W., Clifton C., Kantarcioglu M.: Transforming semi-honest protocols to ensure accountability. Data Knowl. Eng. 65(1), 57-74 (2008).
-
(2008)
Data Knowl. Eng.
, vol.65
, Issue.1
, pp. 57-74
-
-
Jiang, W.1
Clifton, C.2
Kantarcioglu, M.3
-
26
-
-
84864187257
-
Distributed anonymization: achieving privacy for both data subjects and data providers
-
Jurczyk, P., Xiong, L.: Distributed anonymization: achieving privacy for both data subjects and data providers. In: DBSec (2009).
-
(2009)
DBSec
-
-
Jurczyk, P.1
Xiong, L.2
-
27
-
-
85086419359
-
Privacy-preserving data mining in the malicious model
-
Kantarcioglu M., Kardes O.: Privacy-preserving data mining in the malicious model. Int. J. Inf. Comput. Secur. 2(4), 353-375 (2008).
-
(2008)
Int. J. Inf. Comput. Secur.
, vol.2
, Issue.4
, pp. 353-375
-
-
Kantarcioglu, M.1
Kardes, O.2
-
30
-
-
79960446801
-
A game theoretic approach toward multi-party privacy-preserving distributed data mining
-
Kargupta, H., Das, K., Liu, K.: A game theoretic approach toward multi-party privacy-preserving distributed data mining. In: Proceedings of the PKDD (2007).
-
(2007)
Proceedings of the PKDD
-
-
Kargupta, H.1
Das, K.2
Liu, K.3
-
34
-
-
34548805858
-
t-closeness: privacy beyond k-anonymity and ℓ-diversity
-
Li, N., Li, T., Venkatasubramanian, S. t-closeness: privacy beyond k-anonymity and ℓ-diversity. In: ICDE (2007).
-
(2007)
ICDE
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
35
-
-
33746437508
-
Privacy preserving data mining
-
Lindell Y., Pinkas B.: Privacy preserving data mining. J. Cryptol. 15(3), 177-206 (2002).
-
(2002)
J. Cryptol.
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
36
-
-
34248181923
-
ℓ-diversity: privacy beyond k-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: ℓ-diversity: privacy beyond k-anonymity. ACM TKDD 1(1) (2007).
-
(2007)
ACM TKDD
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
38
-
-
70350686724
-
Anonymizing healthcare data: a case study on the blood transfusion service
-
Mohammed, N., Fung, B. C. M., Hung, P. C. K., Lee, C.: Anonymizing healthcare data: a case study on the blood transfusion service. In: SIGKDD (2009a).
-
(2009)
SIGKDD
-
-
Mohammed, N.1
Fung, B.C.M.2
Hung, P.C.K.3
Lee, C.4
-
39
-
-
70349096680
-
Privacy-preserving data mashup
-
Mohammed, N., Fung, B. C. M., Wang, K., Hung, P. C. K.: Privacy-preserving data mashup. In: EDBT (2009b).
-
(2009)
EDBT
-
-
Mohammed, N.1
Fung, B.C.M.2
Wang, K.3
Hung, P.C.K.4
-
40
-
-
78149335185
-
Centralized and distributed anonymization for high-dimensional healthcare data
-
33
-
Mohammed, N., Fung, B. C. M., Hung, P. C. K., Lee, C. (2010) Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans. Knowl. Discov. Data (TKDD) 4(4), 18: 1-18: 33.
-
(2010)
ACM Trans. Knowl. Discov. Data (TKDD)
, vol.4-18
, Issue.4
, pp. 1-18
-
-
Mohammed, N.1
Fung, B.C.M.2
Hung, P.C.K.3
Lee, C.4
-
41
-
-
0001730497
-
Non-cooperative games
-
Nash J.: Non-cooperative games. Ann. Math. 54(2), 286-295 (1951).
-
(1951)
Ann. Math.
, vol.54
, Issue.2
, pp. 286-295
-
-
Nash, J.1
-
42
-
-
33745834241
-
-
Newman, D. J., Hettich, S., Blake, C. L., Merz, C. J.: UCI Repository of Machine Learning Databases. http://archive. ics. uci. edu/ml/ (1998).
-
(1998)
UCI Repository of Machine Learning Databases
-
-
Newman, D.J.1
Hettich, S.2
Blake, C.L.3
Merz, C.J.4
-
45
-
-
4544312695
-
Cryptographic techniques for privacy-preserving data mining
-
Pinkas B.: Cryptographic techniques for privacy-preserving data mining. ACM SIGKDD Explor. Newsl. 4(2), 12-19 (2002).
-
(2002)
ACM SIGKDD Explor. Newsl.
, vol.4
, Issue.2
, pp. 12-19
-
-
Pinkas, B.1
-
47
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P.: Protecting respondents' identities in microdata release. IEEE TKDE 13(6), 1010-1027 (2001).
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
48
-
-
0242698173
-
Datafly: a system for providing anonymity in medical data
-
Sweeney, L.: Datafly: a system for providing anonymity in medical data. In: Proceedings of the DBSec (1998).
-
(1998)
Proceedings of the DBSec
-
-
Sweeney, L.1
-
49
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Sweeney L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 571-588 (2002a).
-
(2002)
Int. J. Uncertain. Fuzziness Knowl. Based Syst.
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
51
-
-
0038896772
-
Security checking in relational database management systems augmented with inference engines
-
Thuraisingham, B. M.: Security checking in relational database management systems augmented with inference engines. Comput. Secur. 6(6), 479-492 (1987).
-
(1987)
Comput. Secur.
, vol.6
, Issue.6
, pp. 479-492
-
-
Thuraisingham, B.M.1
-
52
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the ACM SIGKDD (2002).
-
(2002)
Proceedings of the ACM SIGKDD
-
-
Vaidya, J.1
Clifton, C.2
-
53
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data
-
Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the ACM SIGKDD (2003).
-
(2003)
Proceedings of the ACM SIGKDD
-
-
Vaidya, J.1
Clifton, C.2
-
54
-
-
34147125465
-
Handicapping attacker's confidence: An alternative to k-anonymization
-
Wang K., Fung B. C. M., Yu P. S.: Handicapping attacker's confidence: An alternative to k-anonymization. KAIS 11(3), 345-368 (2007).
-
(2007)
Kais
, vol.11
, Issue.3
, pp. 345-368
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
55
-
-
0027621739
-
Intelligent integration of information
-
Wiederhold, G.: Intelligent integration of information. In: Proceedings of ACM SIGMOD, pp 434-437 (1993).
-
(1993)
Proceedings of ACM SIGMOD
, pp. 434-437
-
-
Wiederhold, G.1
-
56
-
-
33749571958
-
(α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
-
Wong, R. C. W., Li, J., Fu, A. W. C., Wang, K.: (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: SIGKDD (2006).
-
(2006)
SIGKDD
-
-
Wong, R.C.W.1
Li, J.2
Fu, A.W.C.3
Wang, K.4
-
57
-
-
84893853914
-
Anatomy: simple and effective privacy preservation
-
Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation. In: VLDB (2006).
-
(2006)
VLDB
-
-
Xiao, X.1
Tao, Y.2
-
58
-
-
77952257230
-
The hardness and approximation algorithms for l-diversity
-
Xiao, X., Yi, K., Tao, Y. The hardness and approximation algorithms for l-diversity. In: EDBT (2010).
-
(2010)
EDBT
-
-
Xiao, X.1
Yi, K.2
Tao, Y.3
-
59
-
-
84880121624
-
Privacy-preserving classification of customer data without loss of accuracy
-
Yang, Z., Zhong, S., Wright, R. N.: Privacy-preserving classification of customer data without loss of accuracy. In: Proceedings of the SDM (2005).
-
(2005)
Proceedings of the SDM
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
61
-
-
33745599368
-
Distributed privacy preserving information sharing
-
Zhang, N., Zhao, W.: Distributed privacy preserving information sharing. In: Proceedings of the VLDB (2005).
-
(2005)
Proceedings of the VLDB
-
-
Zhang, N.1
Zhao, W.2
|