-
1
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
ACM, New York
-
Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., Talwar, K.: Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In: Proceedings of the Twenty-Sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 273-282. ACM, New York (2007)
-
(2007)
Proceedings of the Twenty-Sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
2
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
ACM, New York
-
Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the SuLQ framework. In: Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 128-138. ACM, New York (2005)
-
(2005)
Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
3
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
ACM, New York
-
Blum, A., Ligett, K., Roth, A.: A learning theory approach to non-interactive database privacy. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 609-618. ACM, New York (2008)
-
(2008)
Proceedings of the 40th Annual ACM Symposium on Theory of Computing
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
4
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
Dalenius, T.: Towards a methodology for statistical disclosure control. Statistik Tidskrift 15(429-444), 2-1 (1977)
-
(1977)
Statistik Tidskrift
, vol.15
, Issue.429-444
, pp. 2-11
-
-
Dalenius, T.1
-
6
-
-
33746335051
-
Differential privacy
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. Springer, Heidelberg
-
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
7
-
-
70349305273
-
Differential privacy: A survey of results
-
Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. Springer, Heidelberg
-
Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1-19. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
8
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
DOI 10.1007/11761679-29, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: Privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486-503. Springer, Heidelberg (2006) (Pubitemid 44072257)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
9
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
DOI 10.1007/11681878-14, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006) (Pubitemid 43979853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876 LNCS
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
10
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Dwork, C., Nissim, K.: Privacy-preserving datamining on vertically partitioned databases. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 528-544. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
13
-
-
77951765129
-
δ-presence without complete world knowledge
-
Nergiz, M.E., Clifton, C.: δ-presence without complete world knowledge. IEEE Transactions on Knowledge and Data Engineering 22(6), 868-883 (2010), http://doi.ieeecomputersociety.org/10.1109/TKDE.2009.125
-
(2010)
IEEE Transactions on Knowledge and Data Engineering
, vol.22
, Issue.6
, pp. 868-883
-
-
Nergiz, M.E.1
Clifton, C.2
-
14
-
-
35448937300
-
Hiding the presence of individuals from shared databases
-
Nergiz, M., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared databases. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, Beijing, China, June 11-14, pp. 665-676 (2007), http://doi.acm.org/10.1145/1247480.1247554
-
(2007)
Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, Beijing, China, June 11-14
, pp. 665-676
-
-
Nergiz, M.1
Atzori, M.2
Clifton, C.3
-
15
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
ACM, New York
-
Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, pp. 75-84. ACM, New York (2007)
-
(2007)
Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
16
-
-
85015649873
-
Airavat: Security and privacy for MapReduce
-
USENIX Association
-
Roy, I., Setty, S., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: Security and privacy for MapReduce. In: Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, p. 20. USENIX Association (2010)
-
(2010)
Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation
, pp. 20
-
-
Roy, I.1
Setty, S.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
|