-
1
-
-
33746711412
-
Approximation algorithms for k-anonymity
-
November
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. Journal of Privacy Technology (November 2005)
-
(2005)
Journal of Privacy Technology
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
2
-
-
49149120168
-
A fuzzy approach to multimodal biometric continuous authentication
-
Azzini, A., Marrara, S., Sassi, R., Scotti, F.: A fuzzy approach to multimodal biometric continuous authentication. Fuzzy Optimization and Decision Making 7(3), 215-302 (2008)
-
(2008)
Fuzzy Optimization and Decision Making
, vol.7
, Issue.3
, pp. 215-302
-
-
Azzini, A.1
Marrara, S.2
Sassi, R.3
Scotti, F.4
-
3
-
-
34250017239
-
A face is exposed for AOL searcher no. 4417749
-
August 9
-
Barbaro, M., Zeller, T.: A face is exposed for AOL searcher no. 4417749. New York Times, August 9 (2006)
-
(2006)
New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
5
-
-
84857694105
-
Protecting privacy of sensitive value distributions in data release
-
Athens Greece September
-
Bezzi, M., De Capitani di Vimercati, S., Livraga, G., Samarati, P.: Protecting privacy of sensitive value distributions in data release. In: Proc. of the 6th Workshop on Security and Trust Management (STM 2010), Athens, Greece (September 2010)
-
(2010)
Proc. of the 6th Workshop on Security and Trust Management (STM 2010
-
-
Bezzi, M.1
De Capitani Di Vimercati, S.2
Livraga, G.3
Samarati, P.4
-
6
-
-
85011039411
-
Privacy skyline: Privacy with multidimensional adversarial knowledge
-
Vienna, Austria September
-
Chen, B.C., LeFevre, K., Ramakrishnan, R.: Privacy skyline: Privacy with multidimensional adversarial knowledge. In: Proc. of the 33rd International Conference on Very Large Data Bases (VLDB 2007), Vienna, Austria (September 2007)
-
(2007)
Proc. of the 33rd International Conference on Very Large Data Bases (VLDB 2007
-
-
Chen, B.C.1
LeFevre, K.2
Ramakrishnan, R.3
-
7
-
-
60649105959
-
Privacy-aware biometrics: Design and implementation of a multimodal verification system
-
Anaheim CA USA (December
-
Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy-aware biometrics: Design and implementation of a multimodal verification system. In: Proc. of the 24th Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA, USA (December 2008)
-
(2008)
Proc. of the 24th Annual Computer Security Applications Conference (ACSAC 2008
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
8
-
-
70350222224
-
Fragmentation design for efficient query execution over sensitive distributed databases
-
Montreal, Canada June
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation design for efficient query execution over sensitive distributed databases. In: Proc. of the 29th International Conference on Distributed Computing Systems (ICDCS 2009), Montreal, Canada (June 2009)
-
(2009)
Proc. of the 29th International Conference on Distributed Computing Systems (ICDCS 2009
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
9
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Transactions on Information and System Security (TISSEC) 13(3), 22:1-22:33 (2010)
-
(2010)
ACM Transactions on Information and System Security (TISSEC
, vol.13
, Issue.3
, pp. 221-2233
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
10
-
-
79960907469
-
κ-Anonymity
-
Yu, T., Jajodia, S. (eds.), Springer, Heidelberg
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: κ-Anonymity. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Springer, Heidelberg (2007)
-
(2007)
Secure Data Management in Decentralized Systems
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
11
-
-
84882724877
-
Microdata protection
-
In: Yu, T., Jajodia, S. (eds.), Springer, Heidelberg
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Microdata protection. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Springer, Heidelberg (2007)
-
(2007)
Secure Data Management in Decentralized Systems
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
12
-
-
85131612415
-
Theory of privacy and anonymity
-
In: Atallah, M., Blanton, M. (eds.), 2nd edn. CRC Press, Boca Raton
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Theory of privacy and anonymity. In: Atallah, M., Blanton, M. (eds.) Algorithms and Theory of Computation Handbook, 2nd edn. CRC Press, Boca Raton (2009)
-
(2009)
Algorithms and Theory of Computation Handbook
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
13
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
Dalenius, T.: Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, 429-444 (1977)
-
(1977)
Statistik Tidskrift
, vol.15
, pp. 429-444
-
-
Dalenius, T.1
-
14
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Transactions on Database Systems (TODS) 35(2), 12:1-12:46 (2010)
-
(2010)
ACM Transactions on Database Systems (TODS
, vol.35
, Issue.2
, pp. 121-1246
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
15
-
-
79958034128
-
Fragments and loose associations: Respecting privacy in data publishing
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. Proc. of the VLDB Endowment 3(1), 1370-1381 (2010)
-
(2010)
Proc. of the VLDB Endowment
, vol.3
, Issue.1
, pp. 1370-1381
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
16
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006) (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
17
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
DOI 10.1007/11681878-14, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006) (Pubitemid 43979853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
19
-
-
4644223618
-
Accuracy and performance of biometric systems
-
Como, Italy (May
-
Gamassi, M., Lazzaroni, M., Misino, M., Piuri, V., Sana, D., Scotti, F.: Accuracy and performance of biometric systems. In: Proc. of the 2004 IEEE Instrumentation & Measurement Technology Conference (IMTC 2004), Como, Italy (May 2004)
-
(2004)
Proc. of the 2004 IEEE Instrumentation & Measurement Technology Conference (IMTC 2004
-
-
Gamassi, M.1
Lazzaroni, M.2
Misino, M.3
Piuri, V.4
Sana, D.5
Scotti, F.6
-
20
-
-
84927600695
-
Robust fingerprint detection for access control
-
Rome, Italy ( May
-
Gamassi, M., Piuri, V., Sana, D., Scotti, F.: Robust fingerprint detection for access control. In: Proc. of the 2nd RoboCare Workshop (RoboCare 2005), Rome, Italy (May 2005)
-
(2005)
Proc. of the 2nd RoboCare Workshop (RoboCare 2005
-
-
Gamassi, M.1
Piuri, V.2
Sana, D.3
Scotti, F.4
-
23
-
-
29844444250
-
Incognito: Efficient full-domain κ-anonymity
-
Baltimore, MD, USA (June
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain κ-anonymity. In: Proc. of the 2005 ACM SIGMOD International Conference on Management of Data (SIGMOD 2005), Baltimore, MD, USA (June 2005)
-
(2005)
Proc. of the 2005 ACM SIGMOD International Conference on Management of Data (SIGMOD 2005
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
24
-
-
33749606641
-
Mondrian multidimensional κ-anonymity
-
Atlanta, GA, USA (April
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional κ-anonymity. In: Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE 2006), Atlanta, GA, USA (April 2006)
-
(2006)
Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE 2006
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
25
-
-
34548723856
-
Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking
-
Istanbul, Turkey (April
-
Li, F., Sun, J., Papadimitriou, S., Mihaila, G., Stanoi, I.: Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking. In: Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey (April 2007)
-
(2007)
Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE 2007
-
-
Li, F.1
Sun, J.2
Papadimitriou, S.3
Mihaila, G.4
Stanoi, I.5
-
26
-
-
34548805858
-
T-closeness: Privacy beyond κ-anonymity and ℓ-diversity
-
Istanbul, Turkey (April
-
Li, N., Li, T., Venkatasubramanian, S.: T-closeness: Privacy beyond κ-anonymity and ℓ-diversity. In: Proc.of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey (April 2007)
-
(2007)
Proc.of the 23rd IEEE International Conference on Data Engineering (ICDE 2007
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
28
-
-
77952262067
-
Data publishing against realistic adversaries
-
Machanavajjhala, A., Gehrke, J., Götz, M.: Data publishing against realistic adversaries. Proc. of the VLDB Endowment 2(1), 790-801 (2009)
-
(2009)
Proc. of the VLDB Endowment
, vol.2
, Issue.1
, pp. 790-801
-
-
Machanavajjhala, A.1
Gehrke, J.2
Götz, M.3
-
29
-
-
34248181923
-
ℓ-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: ℓ-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD) 1(1), 3:1-3:52 (2007)
-
(2007)
ACM Transactions on Knowledge Discovery from Data (TKDD
, vol.1
, Issue.1
, pp. 31-352
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
30
-
-
34548748619
-
Worstcase background knowledge for privacy-preserving data publishing. In: Proc. of the 23rd
-
Istanbul, Turkey (April
-
Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.Y.: Worstcase background knowledge for privacy-preserving data publishing. In: Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey (April 2007)
-
(2007)
IEEE International Conference on Data Engineering (ICDE 2007
-
-
Martin, D.J.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.Y.5
-
32
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
Berkeley/Oakland, CA, USA (May
-
Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proc. of the 2008 IEEE Symposium on Security and Privacy (SP 2008), Berkeley/Oakland, CA, USA (May 2008)
-
(2008)
Proc. of the 2008 IEEE Symposium on Security and Privacy (SP 2008
-
-
Narayanan, A.1
Shmatikov, V.2
-
33
-
-
77953213147
-
Myths and fallacies of personally identifiable information
-
Narayanan, A., Shmatikov, V.: Myths and fallacies of personally identifiable information. Communications of the ACM (CACM) 53, 24-26 (2010)
-
(2010)
Communications of the ACM (CACM
, vol.53
, Issue.24-26
-
-
Narayanan, A.1
Shmatikov, V.2
-
34
-
-
35448937300
-
Hiding the presence of individuals from shared databases
-
Beijing, China (June
-
Nergiz, M.E., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared databases. In: Proc. of the 2007 ACM SIGMOD International Conference on Management of Data (SIGMOD 2007), Beijing, China (June 2007)
-
(2007)
Proc. of the 2007 ACM SIGMOD International Conference on Management of Data (SIGMOD 2007
-
-
Nergiz, M.E.1
Atzori, M.2
Clifton, C.3
-
35
-
-
34548804367
-
Multirelational κ-anonymity
-
Istanbul, Turkey (April
-
Nergiz, M., Clifton, C., Nergiz, A.: Multirelational κ-anonymity. In: Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey (April 2007)
-
(2007)
Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE 2007
-
-
Nergiz, M.1
Clifton, C.2
Nergiz, A.3
-
36
-
-
67649661827
-
Privacy preserving publishing on multiple quasiidentifiers
-
Shanghai, China (March-April
-
Pei, J., Tao, Y., Li, J., Xiao, X.: Privacy preserving publishing on multiple quasiidentifiers. In: Proc. of the 25th IEEE International Conference on Data Engineering (ICDE 2009), Shanghai, China (March-April 2009)
-
(2009)
Proc. of the 25th IEEE International Conference on Data Engineering (ICDE 2009
-
-
Pei, J.1
Tao, Y.2
Li, J.3
Xiao, X.4
-
37
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
Samarati, P.: Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering (TKDE) 13(6), 1010-1027 (2001) (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
38
-
-
84859177489
-
Privacy-preserving anonymization of setvalued data
-
Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of setvalued data. Proc. of the VLDB Endowment 1, 115-125 (2008)
-
(2008)
Proc. of the VLDB Endowment
, vol.1
, pp. 115-125
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
40
-
-
79951729684
-
Anonymizing temporal data
-
Sydney, Australia (December
-
Wang, K., Xu, Y., Wong, R., Fu, A.: Anonymizing temporal data. In: Proc. of the 2010 IEEE International Conference on Data Mining (ICDM 2010), Sydney, Australia (December 2010)
-
(2010)
Proc. of the 2010 IEEE International Conference on Data Mining (ICDM 2010
-
-
Wang, K.1
Xu, Y.2
Wong, R.3
Fu, A.4
-
42
-
-
34250680246
-
Personalized privacy preservation
-
Chicago, IL, USA (June
-
Xiao, X., Tao, Y.: Personalized privacy preservation. In: Proc. of the 2006 ACM SIGMOD International Conference on Management of Data (SIGMOD 2006), Chicago, IL, USA (June 2006)
-
(2006)
Proc. of the 2006 ACM SIGMOD International Conference on Management of Data (SIGMOD 2006
-
-
Xiao, X.1
Tao, Y.2
-
44
-
-
77952257230
-
The hardness and approximation algorithms for ℓ-diversity
-
Lausanne Switzerland (March
-
Xiao, X., Yi, K., Tao, Y.: The hardness and approximation algorithms for ℓ-diversity. In: Proc. of the 13th International Conference on Extending Database Technology (EDBT 2010), Lausanne, Switzerland (March 2010)
-
(2010)
Proc. of the 13th International Conference on Extending Database Technology (EDBT 2010
-
-
Xiao, X.1
Yi, K.2
Tao, Y.3
-
45
-
-
70349134605
-
Continuous privacy preserving publishing of data streams
-
Saint Petersburg, Russia (March
-
Zhou, B., Han, Y., Pei, J., Jiang, B., Tao, Y., Jia, Y.: Continuous privacy preserving publishing of data streams. In: Proc. of the 12th International Conference on Extending Database Technology (EDBT 2009), Saint Petersburg, Russia (March 2009)
-
(2009)
Proc. of the 12th International Conference on Extending Database Technology (EDBT 2009
-
-
Zhou, B.1
Han, Y.2
Pei, J.3
Jiang, B.4
Tao, Y.5
Jia, Y.6
|