-
1
-
-
70350674935
-
A data privacy taxonomy
-
Sexton, A.P. (ed.) BNCOD 26. Springer, Heidelberg
-
Barker, K., Askari, M., Banerjee, M., Ghazinour, K., Mackas, B., Majedi, M., Pun, S., Williams, A.: A data privacy taxonomy. In: Sexton, A.P. (ed.) BNCOD 26. LNCS, vol. 5588, pp. 42-54. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5588
, pp. 42-54
-
-
Barker, K.1
Askari, M.2
Banerjee, M.3
Ghazinour, K.4
Mackas, B.5
Majedi, M.6
Pun, S.7
Williams, A.8
-
2
-
-
84878681166
-
Ask a better question, get a better answer a new approach to private data analysis
-
Schwentick, T., Suciu, D. (eds.) ICDT 2007. Springer, Heidelberg
-
Dwork, C.: Ask a better question, get a better answer a new approach to private data analysis. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, vol. 4353, pp. 18-27. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4353
, pp. 18-27
-
-
Dwork, C.1
-
3
-
-
33746335051
-
Differential privacy
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
-
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
4
-
-
70349305273
-
Differential privacy: A survey of results
-
Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. Springer, Heidelberg
-
Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1-19. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
5
-
-
79955994832
-
Capturing p3p semantics using an enforceable latticebased structure
-
ACM, New York
-
Ghazinour, K., Barker, K.: Capturing p3p semantics using an enforceable latticebased structure. In: Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, PAIS 2011, pp. 4:1-4:6. ACM, New York (2011), http://doi.acm.org/10.1145/1971690.1971694
-
(2011)
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, PAIS 2011
-
-
Ghazinour, K.1
Barker, K.2
-
6
-
-
54249127401
-
A game-theoretical approach to data-privacy protection from context-based inference attacks: A location-privacy protection case study
-
Jonker, W., Petkovic, M. (eds.) SDM 2008. Springer, Heidelberg
-
Gianini, G., Damiani, E.: A game-theoretical approach to data-privacy protection from context-based inference attacks: A location-privacy protection case study. In: Jonker, W., Petkovic, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 133-150. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5159
, pp. 133-150
-
-
Gianini, G.1
Damiani, E.2
-
7
-
-
70849131224
-
A framework to balance privacy and data usability using data degradation
-
29-31
-
Van Heerde, H., Fokkinga, M., Anciaux, N.: A framework to balance privacy and data usability using data degradation. In: International Conference on Computational Science and Engineering, CSE 2009, vol. 3, pp. 146-153 (29-31, 2009)
-
(2009)
International Conference on Computational Science and Engineering, CSE 2009
, vol.3
, pp. 146-153
-
-
Van Heerde, H.1
Fokkinga, M.2
Anciaux, N.3
-
8
-
-
27644505323
-
Valuating privacy
-
Huberman, B.A., Adar, E., Fine, L.R.: Valuating privacy. IEEE Security & Privacy 3, 22-25 (2005)
-
(2005)
IEEE Security & Privacy
, vol.3
, pp. 22-25
-
-
Huberman, B.A.1
Adar, E.2
Fine, L.R.3
-
9
-
-
79952805205
-
Towards defining semantic foundations for purpose-based privacy policies
-
ACM, New York
-
Jafari, M., Fong, P.W., Safavi-Naini, R., Barker, K., Sheppard, N.P.: Towards defining semantic foundations for purpose-based privacy policies. In: Proceedings of the first ACM conference on Data and application security and privacy, CODASPY 2011, pp. 213-224. ACM, New York (2011), http://doi.acm.org/10. 1145/1943513.1943541
-
(2011)
Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY 2011
, pp. 213-224
-
-
Jafari, M.1
Fong, P.W.2
Safavi-Naini, R.3
Barker, K.4
Sheppard, N.P.5
-
10
-
-
38849161575
-
Privacy-enhanced web personalization
-
Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) Adaptive Web 2007. Springer, Heidelberg
-
Kobsa, A.: Privacy-enhanced web personalization. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) Adaptive Web 2007. LNCS, vol. 4321, pp. 628-670. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4321
, pp. 628-670
-
-
Kobsa, A.1
-
12
-
-
78651450125
-
Beyond k-anonymity: A decision theoretic framework for assessing privacy risk
-
Lebanon, G., Scannapieco, M., Fouad, M.R., Bertino, E.: Beyond k-anonymity: A decision theoretic framework for assessing privacy risk. Trans. Data Privacy 2, 153-183 (2009), http://portal.acm.org/citation.cfm?id=1744063. 1744064
-
(2009)
Trans. Data Privacy
, vol.2
, pp. 153-183
-
-
Lebanon, G.1
Scannapieco, M.2
Fouad, M.R.3
Bertino, E.4
-
13
-
-
34548805858
-
t-closeness: Privacy beyond k-anonymity and l-diversity
-
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106-115 (2007)
-
(2007)
IEEE 23rd International Conference on Data Engineering, ICDE 2007
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
14
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
March
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1 (March 2007), http://doi.acm.org/10.1145/1217299.1217302
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
15
-
-
77954330726
-
New approach to quantification of privacy on social network sites
-
Ngoc, T.H., Echizen, I., Komei, K., Yoshiura, H.: New approach to quantification of privacy on social network sites. In: International Conference on Advanced Information Networking and Applications (2005)
-
International Conference on Advanced Information Networking and Applications (2005)
-
-
Ngoc, T.H.1
Echizen, I.2
Komei, K.3
Yoshiura, H.4
-
21
-
-
0038803983
-
Social and political dimensions of privacy
-
Westin, A.F.: Social and political dimensions of privacy. Journal of Social Issues 59(2), 431-453 (2003)
-
(2003)
Journal of Social Issues
, vol.59
, Issue.2
, pp. 431-453
-
-
Westin, A.F.1
-
22
-
-
84871185114
-
Controlling inference: Avoiding p-level reduction during analysis
-
Australian Computer Society, Inc., Darlinghurst
-
Williams, A., Barker, K.: Controlling inference: avoiding p-level reduction during analysis. In: Proceedings of the fifth Australasian symposium on ACSW frontiers, ACSW 2007, vol. 68, pp. 193-200. Australian Computer Society, Inc., Darlinghurst (2007), http://portal.acm.org/citation.cfm?id=1274531. 1274554
-
(2007)
Proceedings of the Fifth Australasian Symposium on ACSW Frontiers, ACSW 2007
, vol.68
, pp. 193-200
-
-
Williams, A.1
Barker, K.2
-
23
-
-
79952611449
-
Analysis of social networking privacy policies
-
ACM, New York
-
Wu, L., Majedi, M., Ghazinour, K., Barker, K.: Analysis of social networking privacy policies. In: EDBT 2010: Proceedings of the 2010 EDBT/ICDT Workshops, pp. 1-5. ACM, New York (2010)
-
(2010)
EDBT 2010: Proceedings of the 2010 EDBT/ICDT Workshops
, pp. 1-5
-
-
Wu, L.1
Majedi, M.2
Ghazinour, K.3
Barker, K.4
|