-
1
-
-
77049087087
-
Anonymizing tables
-
Aggarwal G, Feder T, Kenthapadi K, Motwani R, Panigrahy R, Thomas D, Zhu A (2005) Anonymizing tables. In: ICDT, pp 246-258
-
(2005)
ICDT
, pp. 246-258
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
5
-
-
38049126170
-
Efficient k-anonymization using clustering techniques
-
Byun J-W, Kamra A, Bertino E, Li N (2007) Efficient k-anonymization using clustering techniques. In: DASFAA, pp 188-200
-
(2007)
DASFAA
, pp. 188-200
-
-
Byun, J.-W.1
Kamra, A.2
Bertino, E.3
Li, N.4
-
6
-
-
68649129111
-
A framework for efficient data anonymization under privacy and accuracy constraints
-
Ghinita G, Karras P, Kalnis P, Mamoulis N (2009) A framework for efficient data anonymization under privacy and accuracy constraints. ACM Trans Database Syst 34(2)
-
(2009)
ACM Trans Database Syst
, vol.34
, Issue.2
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
7
-
-
69549119179
-
K-anonymization with minimal loss of information
-
10.1109/TKDE.2008.129
-
A Gionis T Tassa 2009 k-anonymization with minimal loss of information IEEE Trans Knowl Data Eng 21 2 206 219 10.1109/TKDE.2008.129
-
(2009)
IEEE Trans Knowl Data Eng
, vol.21
, Issue.2
, pp. 206-219
-
-
Gionis, A.1
Tassa, T.2
-
9
-
-
78651539208
-
Efficient anonymizations with enhanced utility
-
2725423
-
J Goldberger T Tassa 2010 Efficient anonymizations with enhanced utility TDP 3 149 175 2725423
-
(2010)
TDP
, vol.3
, pp. 149-175
-
-
Goldberger, J.1
Tassa, T.2
-
10
-
-
27644510774
-
Fast algorithms for frequent itemset mining using FP-trees
-
DOI 10.1109/TKDE.2005.166
-
G Grahne J Zhu 2005 Fast algorithms for frequent itemset mining using fp-trees IEEE Trans Knowl Data Eng 17 10 1347 1362 10.1109/TKDE.2005.166 (Pubitemid 41560422)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.10
, pp. 1347-1362
-
-
Grahne, G.1
Zhu, J.2
-
11
-
-
17044438212
-
Efficient algorithms for mining closed itemsets and their lattice structure
-
DOI 10.1109/TKDE.2005.60
-
C-J Hsiao 2005 Efficient algorithms for mining closed itemsets and their lattice structure IEEE Trans Knowl Data Eng 17 4 462 478 10.1109/TKDE.2005.60 (Pubitemid 40495590)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.4
, pp. 462-478
-
-
Zaki, M.J.1
Hsiao, C.-J.2
-
14
-
-
33749606641
-
Mondrian multidimensional K-anonymity
-
DOI 10.1109/ICDE.2006.101, 1617393, Proceedings of the 22nd International Conference on Data Engineering, ICDE '06
-
LeFevre K, DeWitt DJ, Ramakrishnan R (2006) Mondrian multidimensional k-anonymity. In: ICDE, p 25 (Pubitemid 44539817)
-
(2006)
Proceedings - International Conference on Data Engineering
, vol.2006
, pp. 25
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
15
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and ℓ-diversity
-
DOI 10.1109/ICDE.2007.367856, 4221659, 23rd International Conference on Data Engineering, ICDE 2007
-
Li N, Li T, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and ℓ-diversity. In: Proceedings of IEEE international conference on data engineering (ICDE) 2007, pp 106-115 (Pubitemid 47422014)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 106-115
-
-
Ninghui, L.1
Tiancheng, L.2
Venkatasubramanian, S.3
-
18
-
-
34548689125
-
Thoughts on k-anonymization
-
DOI 10.1016/j.datak.2007.03.009, PII S0169023X07000468
-
M Nergiz C Clifton 2007 Thoughts on k-anonymization Data Knowl Eng 63 3 622 645 10.1016/j.datak.2007.03.009 (Pubitemid 47418332)
-
(2007)
Data and Knowledge Engineering
, vol.63
, Issue.3
, pp. 622-645
-
-
Nergiz, M.E.1
Clifton, C.2
-
19
-
-
35448962139
-
Approximate algorithms for K-anonymity
-
DOI 10.1145/1247480.1247490, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
Park H, Shim K (2007) Approximate algorithms for k-anonymity. In: SIGMOD '07: proceedings of the 2007 ACM SIGMOD international conference on management of data, pp 67-78 (Pubitemid 47630797)
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 67-78
-
-
Park, H.1
Shim, K.2
-
21
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
P Samarati 2001 Protecting respondents' identities in microdata release IEEE Trans Knowl Data Eng 13 6 1010 1027 10.1109/69.971193 (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
23
-
-
0002880407
-
Minning generalized association rules
-
Srikant R, Agrawal R (1995) Minning generalized association rules. In: VLDB, pp 407-419
-
(1995)
VLDB
, pp. 407-419
-
-
Srikant, R.1
Agrawal, R.2
-
26
-
-
38049087648
-
Generating microdata with p-sensitive k-anonymity property
-
Truta T, Campan A, Meyer P (2007) Generating microdata with p-sensitive k-anonymity property. In: SDM, pp 124-141
-
(2007)
SDM
, pp. 124-141
-
-
Truta, T.1
Campan, A.2
Meyer, P.3
-
27
-
-
33749571958
-
(α, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing
-
KDD 2006: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
Wong R, Li J, Fu A, Wang K (2006) (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: In ACM SIGKDD, pp 754-759 (Pubitemid 44535586)
-
(2006)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, vol.2006
, pp. 754-759
-
-
Wong, R.C.-W.1
Li, J.2
Fu, A.W.-C.3
Wang, K.4
-
28
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
Xiao X, Tao Y (2006) Anatomy: simple and effective privacy preservation. In: VLDB, pp 139-150
-
(2006)
VLDB
, pp. 139-150
-
-
Xiao, X.1
Tao, Y.2
|