-
4
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
DOI 10.1145/1265530.1265569, Proceedings of the Twenty-sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2007
-
B. Barak, K. Chaudhuri, C., Dwork, S., Kale, F., McSherry, K. Talwar, Privacy, accuracy, and consistency too: a holistic solution to contingency table release, in: Proceedings of the 26th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS '07), 2007, pp. 273-282. (Pubitemid 47620902)
-
(2007)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
5
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
Proceedings - 21st International Conference on Data Engineering, ICDE 2005
-
R. Bayardo, R. Agrawal, Data privacy through optimal k-anonymization, in: Proceedings of the 21st International Conference on Data Engineering (ICDE '05), 2005, pp. 217-228. (Pubitemid 41731133)
-
(2005)
Proceedings - International Conference on Data Engineering
, pp. 217-228
-
-
Bayardo, R.J.1
Agrawal, R.2
-
6
-
-
84856530175
-
Privacy preserving serial data publishing by role composition
-
Y. Bu, A. Fu, R. Wong, L. Chen, J. Li, Privacy preserving serial data publishing by role composition, in: Proceedings of the 34th International Conference on Very Large Data Bases (VLDB '08), 2008, pp. 845-856.
-
(2008)
Proceedings of the 34th International Conference on Very Large Data Bases (VLDB '08)
, pp. 845-856
-
-
Bu, Y.1
Fu, A.2
Wong, R.3
Chen, L.4
Li, J.5
-
7
-
-
0042734800
-
The GeneTrustee: A universal identification system that ensures privacy and confidentiality for human genetic databases
-
L. Burnett, K. Barlow-Stewart, A. Proos, and H. Aizenberg The GeneTrustee: a universal identification system that ensures privacy and confidentiality for human genetic databases Journal of Law and Medicine 10 4 2003 506 513
-
(2003)
Journal of Law and Medicine
, vol.10
, Issue.4
, pp. 506-513
-
-
Burnett, L.1
Barlow-Stewart, K.2
Proos, A.3
Aizenberg, H.4
-
8
-
-
33750732631
-
Secure anonymization for incremental datasets
-
Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings
-
J.-W. Byun, Y. Sohn, E. Bertino, and N. Li Secure anonymization for incremental datasets Secure Data Management 2006 48 63 (Pubitemid 44699622)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4165
, pp. 48-63
-
-
Byun, J.-W.1
Sohn, Y.2
Bertino, E.3
Li, N.4
-
9
-
-
78751575843
-
Sabre: A sensitive attribute bucketization and redistribution framework for t-closeness
-
J. Cao, P. Karras, P. Kalnis, and K. Tan Sabre: a sensitive attribute bucketization and redistribution framework for t-closeness The VLDB Journal 20 1 2011 59 81
-
(2011)
The VLDB Journal
, vol.20
, Issue.1
, pp. 59-81
-
-
Cao, J.1
Karras, P.2
Kalnis, P.3
Tan, K.4
-
11
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork, Differential privacy, in: Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP '06). 2006, pp. 1-12. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
12
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
B. Fung, K. Wang, R. Chen, and P. Yu Privacy-preserving data publishing: a survey of recent developments ACM Computing Surveys (CSUR) 42 4 2010 1 53
-
(2010)
ACM Computing Surveys (CSUR)
, vol.42
, Issue.4
, pp. 1-53
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.4
-
13
-
-
43349106146
-
Anonymity for continuous data publishing
-
DOI 10.1145/1353343.1353378, Advances in Database Technology - EDBT 2008 - 11th International Conference on Extending Database Technology, Proceedings
-
B. Fung, K. Wang, A. Fu, J. Pei, Anonymity for continuous data publishing, in: Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology (EDBT '08), 2008, ACM, pp. 264-275. (Pubitemid 351661708)
-
(2008)
Advances in Database Technology - EDBT 2008 - 11th International Conference on Extending Database Technology, Proceedings
, pp. 264-275
-
-
Fung, B.C.M.1
Wang, K.2
Fu, A.W.-C.3
Pei, J.4
-
14
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Proceedings - 21st International Conference on Data Engineering, ICDE 2005
-
B. Fung, K. Wang, P. Yu, Top-down specialization for information and privacy preservation, in: Proceedings of the 21st International Conference on Data Engineering (ICDE '05), 2005, IEEE, pp. 205-216. (Pubitemid 41731132)
-
(2005)
Proceedings - International Conference on Data Engineering
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
16
-
-
52649175334
-
K-Anonymization revisited
-
A. Gionis, A. Mazza, T. Tassa, k-Anonymization revisited, in: Proceedings of the 24th International Conference on Data Engineering (ICDE '08), 2008, pp. 744-753.
-
(2008)
Proceedings of the 24th International Conference on Data Engineering (ICDE '08)
, pp. 744-753
-
-
Gionis, A.1
Mazza, A.2
Tassa, T.3
-
21
-
-
34250673244
-
Injecting utility into anonymized datasets
-
DOI 10.1145/1142473.1142499, SIGMOD 2006 - Proceedings of the ACM SIGMOD International Conference on Management of Data
-
D. Kifer, J. Gehrke, Injecting utility into anonymized datasets, in: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data (SIGMOD '06), 2006, pp. 217-228. (Pubitemid 46946515)
-
(2006)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 217-228
-
-
Kifer, D.1
Gehrke, J.2
-
23
-
-
29844444250
-
Incognito: Efficient full-domain K-anonymity
-
DOI 10.1145/1066157.1066164, SIGMOD 2005: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
K. LeFevre, D. DeWitt, R. Ramakrishnan, Incognito: efficient full-domain k-anonymity, in: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data (SIGMOD '05), 2005, pp. 49-60. (Pubitemid 43038916)
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
25
-
-
33749607006
-
L-Diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, l-Diversity: privacy beyond k-anonymity, in: Proceedings of the 22nd International Conference on Data Engineering (ICDE '06), 2006, p. 24.
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering (ICDE '06)
, pp. 24
-
-
MacHanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
26
-
-
2942522665
-
How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems
-
DOI 10.1016/j.jbi.2004.04.005, PII S153204640400053X
-
B. Malin, and L. Sweeney How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems Journal of Biomedical Informatics 37 3 2004 179 192 (Pubitemid 38757792)
-
(2004)
Journal of Biomedical Informatics
, vol.37
, Issue.3
, pp. 179-192
-
-
Malin, B.1
Sweeney, L.2
-
27
-
-
77958579043
-
Privacy-preserving data mining: A feature set partitioning approach
-
N. Matatov, L. Rokach, and O. Maimon Privacy-preserving data mining: a feature set partitioning approach Information Sciences 180 14 2010 2696 2720
-
(2010)
Information Sciences
, vol.180
, Issue.14
, pp. 2696-2720
-
-
Matatov, N.1
Rokach, L.2
Maimon, O.3
-
29
-
-
34548689125
-
Thoughts on k-anonymization
-
DOI 10.1016/j.datak.2007.03.009, PII S0169023X07000468
-
M. Nergiz, and C. Clifton Thoughts on k-anonymization Data and Knowledge Engineering 63 3 2007 622 645 (Pubitemid 47418332)
-
(2007)
Data and Knowledge Engineering
, vol.63
, Issue.3
, pp. 622-645
-
-
Nergiz, M.E.1
Clifton, C.2
-
30
-
-
35448962139
-
Approximate algorithms for K-anonymity
-
DOI 10.1145/1247480.1247490, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
H. Park, K. Shim, Approximate algorithms for k-anonymity, in: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data (SIGMOD '07), 2007, pp. 67-78. (Pubitemid 47630797)
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 67-78
-
-
Park, H.1
Shim, K.2
-
31
-
-
46649101105
-
Maintaining k-anonymity against incremental updates
-
J. Pei, J. Xu, Z. Wang, W. Wang, K. Wang, Maintaining k-anonymity against incremental updates, in: Proceedings of the 19th International Conference on Scientific and Statistical Database Management (SSDBM 2007), 2007, p. 5.
-
(2007)
Proceedings of the 19th International Conference on Scientific and Statistical Database Management (SSDBM 2007)
, pp. 5
-
-
Pei, J.1
Xu, J.2
Wang, Z.3
Wang, W.4
Wang, K.5
-
33
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
P. Samarati Protecting respondent's privacy in microdata release IEEE Transactions on Knowledge and Data Engineering 13 2001 1010 1027 (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
36
-
-
70449369076
-
A survey on privacy preserving data mining
-
J. Wang, Y. Luo, Y. Zhao, J. Le, A survey on privacy preserving data mining, in: Proceedings of the 1st International Workshop on Database Technology and Applications (DBTA '09), 2009, pp. 111-114.
-
(2009)
Proceedings of the 1st International Workshop on Database Technology and Applications (DBTA '09)
, pp. 111-114
-
-
Wang, J.1
Luo, Y.2
Zhao, Y.3
Le, J.4
-
38
-
-
34147125465
-
Handicapping attacker's confidence: An alternative to k-anonymization
-
K. Wang, B. Fung, and P. Yu Handicapping attacker's confidence: an alternative to k-anonymization Knowledge and Information Systems 11 3 2007 345 368
-
(2007)
Knowledge and Information Systems
, vol.11
, Issue.3
, pp. 345-368
-
-
Wang, K.1
Fung, B.2
Yu, P.3
-
39
-
-
33749568934
-
Template-based privacy preservation in classification problems KeWang
-
DOI 10.1109/ICDM.2005.142, 1565713, Proceedings - Fifth IEEE International Conference on Data Mining, ICDM 2005
-
K. Wang, B.C.M. Fung, P.S. Yu, Template-based privacy preservation in classification problems, in: Proceedings of the 4th IEEE International Conference on Data Mining (ICDM '05), 2005, pp. 466-473. (Pubitemid 47385727)
-
(2005)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 466-473
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
40
-
-
19544380211
-
Bottom-up generalization: A data mining solution to privacy protection
-
Proceedings - Fourth IEEE International Conference on Data Mining, ICDM 2004
-
K. Wang, P.S. Yu, S. Chakraborty, Bottom-up generalization: a data mining solution to privacy protection, in: Proceedings of the 4th IEEE International Conference on Data Mining (ICDM '04), 2004, pp. 249-256. (Pubitemid 40731038)
-
(2004)
Proceedings - Fourth IEEE International Conference on Data Mining, ICDM 2004
, pp. 249-256
-
-
Wang, K.1
Yu, P.S.2
Chakraborty, S.3
-
41
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
R. Wong, A. Fu, K. Wang, J. Pei, Minimality attack in privacy preserving data publishing, in: Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB '07), 2007, pp. 543-554.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases (VLDB '07)
, pp. 543-554
-
-
Wong, R.1
Fu, A.2
Wang, K.3
Pei, J.4
-
42
-
-
33749571958
-
(α, k)-Anonymity: An enhanced k-anonymity model for privacy-preserving data publishing
-
KDD 2006: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
R. Wong, J. Li, A. Fu, K. Wang, (α, k)-Anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '06), 2006, pp. 754-759. (Pubitemid 44535586)
-
(2006)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, vol.2006
, pp. 754-759
-
-
Wong, R.C.-W.1
Li, J.2
Fu, A.W.-C.3
Wang, K.4
-
43
-
-
77952788393
-
Global privacy guarantee in serial data publishing
-
R.C.-W. Wong, A.W.-C. Fu, J. Liu, K. Wang, Y. Xu, Global privacy guarantee in serial data publishing, in: Proceedings of the 26th IEEE International Conference on Data Engineering (ICDE '10), 2010, pp. 956-959.
-
(2010)
Proceedings of the 26th IEEE International Conference on Data Engineering (ICDE '10)
, pp. 956-959
-
-
Wong, R.C.-W.1
Fu, A.W.-C.2
Liu, J.3
Wang, K.4
Xu, Y.5
-
44
-
-
77954730854
-
Non-homogeneous generalization in privacy preserving data publishing
-
W.K. Wong, N. Mamoulis, D.W.-L. Cheung, Non-homogeneous generalization in privacy preserving data publishing, in: Proceedings of the 2010 International Conference on Management of Data (SIGMOD '10), 2010, pp. 747-758.
-
(2010)
Proceedings of the 2010 International Conference on Management of Data (SIGMOD '10)
, pp. 747-758
-
-
Wong, W.K.1
Mamoulis, N.2
Cheung, D.W.-L.3
-
46
-
-
35448967088
-
M-invariance: Towards privacy preserving re-publication of dynamic datasets
-
DOI 10.1145/1247480.1247556, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
X. Xiao, Y. Tao, M-invariance: towards privacy preserving re-publication of dynamic datasets, in: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data (SIGMOD '07), 2007, pp. 689-700. (Pubitemid 47630845)
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
47
-
-
33745599656
-
Checking for k-anonymity violation by views
-
VLDB 2005 - Proceedings of 31st International Conference on Very Large Data Bases
-
C. Yao, X. Wang, S. Jajodia, Checking for k-anonymity violation by views, in: Proceedings of the 31st International Conference on Very Large Data Bases (VLDB '05), 2005, pp. 910-921. (Pubitemid 43991064)
-
(2005)
VLDB 2005 - Proceedings of 31st International Conference on Very Large Data Bases
, vol.3
, pp. 910-921
-
-
Yao, C.1
Wang, X.S.2
Jajodia, S.3
|