-
1
-
-
34250661905
-
Achieving anonymity via clustering
-
DOI 10.1145/1142351.1142374, Proceedings of the Twenty-Fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2006
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu, "Achieving Anonymity via Clustering," Proc. 25th ACM SIGMOD-SIGACT-SIGART Symp. Principles of Database Systems (PODS), pp. 153-162, 2006. (Pubitemid 46946477)
-
(2006)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
2
-
-
0041513205
-
Watermarking relational data: Framework, algorithms and analysis
-
DOI 10.1007/s00778-003-0097-x
-
R. Agrawal, P. J. Haas, and J. Kiernan, "Watermarking Relational Data: Framework, Algorithms and Analysis," The Int'l J. Very Large Data Bases, vol. 12, no. 2, pp. 157-169, 2003. (Pubitemid 37017926)
-
(2003)
VLDB Journal
, vol.12
, Issue.2
, pp. 157-169
-
-
Agrawal, R.1
Haas, P.J.2
Kiernan, J.3
-
3
-
-
3142716056
-
Order-preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order-Preserving Encryption for Numeric Data," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 563-574, 2004.
-
(2004)
Proc. ACM SIGMOD Int'l Conf. Management of Data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
5
-
-
37849032496
-
Location privacy protection through obfuscation-based techniques
-
C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati, "Location Privacy Protection Through Obfuscation-Based Techniques," Proc. 21st Ann. IFIP WG 11.3 Working Conf. Data and Applications Security (DBSec), pp. 47-60, 2007.
-
(2007)
Proc. 21st Ann. IFIP WG 11.3 Working Conf. Data and Applications Security (DBSec)
, pp. 47-60
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
Di Vimercati, S.D.C.4
Samarati, P.5
-
6
-
-
52649111585
-
Nearest neighbor retrieval using distance-based hashing
-
V. Athitsos, M. Potamias, P. Papapetrou, and G. Kollios, "Nearest Neighbor Retrieval Using Distance-Based Hashing," Proc. IEEE 24th Int'l Conf. Data Eng. (ICDE), pp. 327-336, 2008.
-
(2008)
Proc. IEEE 24th Int'l Conf. Data Eng. (ICDE)
, pp. 327-336
-
-
Athitsos, V.1
Potamias, M.2
Papapetrou, P.3
Kollios, G.4
-
8
-
-
0001802606
-
The X-tree: An index structure for high-dimensional data
-
S. Berchtold, D. A. Keim, and H.-P. Kriegel, "The X-Tree: An Index Structure for High-Dimensional Data," Proc. 22nd Int'l Conf. Very Large Databases, pp. 28-39, 1996.
-
(1996)
Proc. 22nd Int'l Conf. Very Large Databases
, pp. 28-39
-
-
Berchtold, S.1
Keim, D.A.2
Kriegel, H.-P.3
-
9
-
-
0001728087
-
Indexing large metric spaces for similarity search queries
-
T. Bozkaya and Z. M. Özsoyoglu, "Indexing Large Metric Spaces for Similarity Search Queries," ACM Trans. Database Systems, vol. 24, no. 3, pp. 361-404, 1999.
-
(1999)
ACM Trans. Database Systems
, vol.24
, Issue.3
, pp. 361-404
-
-
Bozkaya, T.1
Özsoyoglu, Z.M.2
-
10
-
-
0345043999
-
Searching in metric spaces
-
E. Chávez, G. Navarro, R. A. Baeza-Yates, and J. L. Marroqúin, "Searching in Metric Spaces," ACM Computing Surveys, vol. 33, no. 3, pp. 273-321, 2001. (Pubitemid 33768485)
-
(2001)
ACM Computing Surveys
, vol.33
, Issue.3
, pp. 273-321
-
-
Chavez, E.1
Navarro, G.2
Baeza-Yates, R.3
Marroquin, J.L.4
-
11
-
-
84993661659
-
M-tree: An efficient access method for similarity search in metric spaces
-
P. Ciaccia, M. Patella, and P. Zezula, "M-Tree: An Efficient Access Method for Similarity Search in Metric Spaces," Proc. Very Large Databases (VLDB), pp. 426-435, 1997.
-
(1997)
Proc. Very Large Databases (VLDB)
, pp. 426-435
-
-
Ciaccia, P.1
Patella, M.2
Zezula, P.3
-
12
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
E. Damiani, S. D. C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs," Proc. 10th ACM Conf. Computer and Comm. Security (CCS), pp. 93-102, 2003. (Pubitemid 40673792)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.D.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
14
-
-
84976803260
-
FastMap: A fast algorithm for indexing, data-mining and visualization of traditional and multimedia data sets
-
C. Faloutsos and K.-I. Lin, "FastMap: A Fast Algorithm for Indexing, Data-Mining and Visualization of Traditional and Multimedia Data Sets," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 163-174, 1995.
-
(1995)
Proc. ACM SIGMOD Int'l Conf. Management of Data
, pp. 163-174
-
-
Faloutsos, C.1
Lin, K.-I.2
-
15
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. L. Tan, "Private Queries in Location Based Services: Anonymizers Are Not Necessary," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 121-132, 2008.
-
(2008)
Proc. ACM SIGMOD Int'l Conf. Management of Data
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.L.5
-
16
-
-
0001944742
-
Similarity search in high dimensions via hashing
-
A. Gionis, P. Indyk, and R. Motwani, "Similarity Search in High Dimensions via Hashing," Proc. 25th Int'l Conf. Very Large Databases (VLDB), pp. 518-529, 1999.
-
(1999)
Proc. 25th Int'l Conf. Very Large Databases (VLDB)
, pp. 518-529
-
-
Gionis, A.1
Indyk, P.2
Motwani, R.3
-
17
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
H. Hacigümüs, B. R. Iyer, C. Li, and S. Mehrotra, "Executing SQL over Encrypted Data in the Database-Service-Provider Model," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 216-227, 2002. (Pubitemid 34985549)
-
(2002)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
18
-
-
0036204131
-
Providing Database as a Service
-
H. Hacigü müs, S. Mehrotra, and B. R. Iyer, "Providing Database as a Service," Proc. 18th Int'l Conf. Data Eng. (ICDE), pp. 29-40, 2002.
-
(2002)
Proc. 18th Int'l Conf. Data Eng. (ICDE)
, pp. 29-40
-
-
Müs, H.H.1
Mehrotra, S.2
Iyer, B.R.3
-
19
-
-
1542292055
-
What is the nearest neighbor in high dimensional spaces?
-
A. Hinneburg, C. C. Aggarwal, and D. A. Keim, "What Is the Nearest Neighbor in High Dimensional Spaces?," Proc. 26th Int'l Conf. Very Large Data Bases (VLDB), pp. 506-515, 2000.
-
(2000)
Proc. 26th Int'l Conf. Very Large Data Bases (VLDB)
, pp. 506-515
-
-
Hinneburg, A.1
Aggarwal, C.C.2
Keim, D.A.3
-
20
-
-
0041664272
-
Index-driven similarity search in metric spaces
-
G. R. Hjaltason and H. Samet, "Index-Driven Similarity Search in Metric Spaces," ACM Trans. Database Systems, vol. 28, no. 4, pp. 517-580, 2003.
-
(2003)
ACM Trans. Database Systems
, vol.28
, Issue.4
, pp. 517-580
-
-
Hjaltason, G.R.1
Samet, H.2
-
21
-
-
23944466912
-
+-tree based indexing method for nearest neighbor search
-
DOI 10.1145/1071610.1071612
-
+-Tree Based Indexing Method for Nearest Neighbor Search," ACM Trans. Database Systems, vol. 30, no. 2, pp. 364-397, 2005. (Pubitemid 41204994)
-
(2005)
ACM Transactions on Database Systems
, vol.30
, Issue.2
, pp. 364-397
-
-
Jagadish, H.V.1
Ooi, B.C.2
Tan, K.-L.3
Yu, C.4
Zhang, R.5
-
22
-
-
84937433025
-
Slim-trees: High performance metric trees minimizing overlap between nodes
-
C. T. Jr, A. J. M. Traina, B. Seeger, and C. Faloutsos, "Slim-Trees: High Performance Metric Trees Minimizing Overlap between Nodes," Proc. Seventh Int'l Conf. Extending Database Technology (EDBT), pp. 51-65, 2000.
-
(2000)
Proc. Seventh Int'l Conf. Extending Database Technology (EDBT)
, pp. 51-65
-
-
Jr., C.T.1
Traina, A.J.M.2
Seeger, B.3
Faloutsos, C.4
-
23
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the Privacy Preserving Properties of Random Data Perturbation Techniques," Proc. IEEE Third Int'l Conf. Data Mining (ICDM), pp. 99-106, 2003.
-
(2003)
Proc. IEEE Third Int'l Conf. Data Mining (ICDM)
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
25
-
-
33749606641
-
Mondrian multidimensional K-anonymity
-
DOI 10.1109/ICDE.2006.101, 1617393, Proceedings of the 22nd International Conference on Data Engineering, ICDE '06
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, "Mondrian Multidimensional K-Anonymity," Proc. 22nd Int'l Conf. Data Eng. (ICDE), p. 25, 2006. (Pubitemid 44539817)
-
(2006)
Proceedings - International Conference on Data Engineering
, vol.2006
, pp. 25
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
26
-
-
0032094249
-
Optimal multi-step k-nearest neighbor search
-
T. Seidl and H. P. Kriegel, "Optimal Multi-Step k-Nearest Neighbor Search," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 154-165, 1998. (Pubitemid 128655965)
-
(1998)
SIGMOD Record
, vol.27
, Issue.2
, pp. 154-165
-
-
Seidl, T.1
Kriegel, H.-P.2
-
27
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
DOI 10.1142/S0218488502001648
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002. (Pubitemid 35384857)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
28
-
-
70849131456
-
Secure k-NN computation on encrypted databases
-
W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis, "Secure k-NN Computation on Encrypted Databases," Proc. 35th ACM SIGMOD Int'l Conf. Management of Data, pp. 139-152, 2009.
-
(2009)
Proc. 35th ACM SIGMOD Int'l Conf. Management of Data
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
30
-
-
84555220858
-
Outsourced similarity search on metric data assets
-
Aalborg Univ.
-
M. L. Yiu, I. Assent, C. S. Jensen, and P. Kalnis, "Outsourced Similarity Search on Metric Data Assets," DB Technical Report TR-28, Aalborg Univ., 2010.
-
(2010)
DB Technical Report TR-28
-
-
Yiu, M.L.1
Assent, I.2
Jensen, C.S.3
Kalnis, P.4
-
31
-
-
67649651664
-
Outsourcing search services on private spatial data
-
M. L. Yiu, G. Ghinita, C. S. Jensen, and P. Kalnis, "Outsourcing Search Services on Private Spatial Data," Proc. IEEE 25th Int'l Conf. Data Eng. (ICDE), pp. 1140-1143, 2009.
-
(2009)
Proc. IEEE 25th Int'l Conf. Data Eng. (ICDE)
, pp. 1140-1143
-
-
Yiu, M.L.1
Ghinita, G.2
Jensen, C.S.3
Kalnis, P.4
|