-
1
-
-
0024914229
-
Security-control methods for statistical databases
-
N. Adam and J. Worthmann. Security-control methods for statistical databases. ACM Computing Surveys, 21(4):515-556, 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.1
Worthmann, J.2
-
2
-
-
33749553930
-
On privacy preservation against adversarial data mining
-
C. C. Aggarwal, J. Pei, and B. Zhang. On privacy preservation against adversarial data mining. In KDD, 2006.
-
(2006)
KDD
-
-
Aggarwal, C.C.1
Pei, J.2
Zhang, B.3
-
3
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609-618, 2008.
-
(2008)
STOC
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
4
-
-
4043113529
-
The use of statistical methods in the U.S. Census: Utah v. Evans
-
DOI 10.1198/000313004X1189
-
P. J. Cantwell, H. Hogan, and K. M. Styles. The use of statistical methods in the u.s. census: Utah v. evans. The American Statistician, 58(3):203-212, 2004. (Pubitemid 39073360)
-
(2004)
American Statistician
, vol.58
, Issue.3
, pp. 203-212
-
-
Cantwell, P.J.1
Hogan, H.2
Styles, K.M.3
-
5
-
-
52649167640
-
When random sampling preserves privacy
-
K. Chaudhuri and N. Mishra. When random sampling preserves privacy. In CRYPTO, 2006.
-
(2006)
CRYPTO
-
-
Chaudhuri, K.1
Mishra, N.2
-
6
-
-
77954718437
-
Privacy-preserving data publishing
-
B.-C. Chen, D. Kifer, K. LeFevre, and A. Machanavajjhala. Privacy-preserving data publishing. Foundations and Trends in Databases, 2(1-2):1-167, 2009.
-
(2009)
Foundations and Trends in Databases
, vol.2
, Issue.1-2
, pp. 1-167
-
-
Chen, B.-C.1
Kifer, D.2
LeFevre, K.3
Machanavajjhala, A.4
-
7
-
-
0034497773
-
Using sample size to limit exposure to data mining
-
C. Clifton. Using sample size to limit exposure to data mining. Journal of Computer Security, 8(4), 2000.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.4
-
-
Clifton, C.1
-
10
-
-
77954693419
-
A data perturbation approach to sensitive classification rule hiding
-
A. Delis, V. S. Verykios, and A. A. Tsitsonis. A data perturbation approach to sensitive classification rule hiding. In SAC, 2010.
-
(2010)
SAC
-
-
Delis, A.1
Verykios, V.S.2
Tsitsonis, A.A.3
-
11
-
-
74549191363
-
Privacy without noise
-
Y. Duan. Privacy without noise. In CIKM, 2009.
-
(2009)
CIKM
-
-
Duan, Y.1
-
12
-
-
50249086141
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP, 2006.
-
(2006)
ICALP
-
-
Dwork, C.1
-
13
-
-
33746086554
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, 2006.
-
(2006)
TCC
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
14
-
-
79959952201
-
On the difficulties of disclosure prevention in statistical databases or the case for differential privacy
-
C. Dwork and M. Naor. On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. JPC, 2(1), 2010.
-
(2010)
JPC
, vol.2
, Issue.1
-
-
Dwork, C.1
Naor, M.2
-
16
-
-
77951201056
-
Privacy-preserving data publishing: A survey on recent developments
-
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey on recent developments. ACM Computing Surveys, 42(4), 2010.
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
17
-
-
65449162734
-
Composition attacks and auxiliary information in data privacy
-
S. R. Ganta, S. P. Kasiviswanathan, and A. Smith. Composition attacks and auxiliary information in data privacy. In KDD, 2008.
-
(2008)
KDD
-
-
Ganta, S.R.1
Kasiviswanathan, S.P.2
Smith, A.3
-
18
-
-
85080535826
-
Towards privacy for social networks: A zero-knowledge based definition of privacy
-
J. Gehrke, E. Lui, and R. Pass. Towards privacy for social networks: A zero-knowledge based definition of privacy. In TCC, 2011.
-
(2011)
TCC
-
-
Gehrke, J.1
Lui, E.2
Pass, R.3
-
19
-
-
50849101381
-
Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays
-
N. Homer, S. Szelinger, M. Redman, D. Duggan, W. Tembe, J. Muehling, J. V. Pearson, D. A. Stephan, S. F. Nelson, and D. W. Craig. Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays. PLoS Genet, 4(8), 08 2008.
-
(2008)
PLoS Genet
, vol.4
, Issue.8
, pp. 08
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
Muehling, J.6
Pearson, J.V.7
Stephan, D.A.8
Nelson, S.F.9
Craig, D.W.10
-
21
-
-
77954711591
-
Towards an axiomatization of statistical privacy and utility
-
D. Kifer and B.-R. Lin. Towards an axiomatization of statistical privacy and utility. In PODS, 2010.
-
(2010)
PODS
-
-
Kifer, D.1
Lin, B.-R.2
-
25
-
-
79959939129
-
From theory to practice on the map
-
Privacy
-
A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke, and L. Vilhuber. Privacy: From theory to practice on the map. In ICDE, 2008.
-
(2008)
ICDE
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.3
Gehrke, J.4
Vilhuber, L.5
-
26
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
F. D. McSherry. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. In SIGMOD, pages 19-30, 2009.
-
(2009)
SIGMOD
, pp. 19-30
-
-
McSherry, F.D.1
-
28
-
-
39749135113
-
A maxmin approach for hiding frequent itemsets
-
G. V. Moustakides and V. S. Verykios. A maxmin approach for hiding frequent itemsets. Data Knowl. Eng., 65(1), 2008.
-
(2008)
Data Knowl. Eng.
, vol.65
, Issue.1
-
-
Moustakides, G.V.1
Verykios, V.S.2
-
29
-
-
37349036574
-
A reconstruction-based algorithm for classification rules hiding
-
J. Natwichai, X. Li, and M. E. Orlowska. A reconstruction-based algorithm for classification rules hiding. In ADC, 2006.
-
(2006)
ADC
-
-
Natwichai, J.1
Li, X.2
Orlowska, M.E.3
-
30
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75-84, 2007.
-
(2007)
STOC
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
33
-
-
70350635777
-
Relationship privacy: Output perturbation for queries with joins
-
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: Output perturbation for queries with joins. In PODS, pages 107-116, 2009.
-
(2009)
PODS
, pp. 107-116
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
34
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P. Samarati. Protecting respondents' identities in microdata release. TKDE, 13(6), 2001.
-
(2001)
TKDE
, vol.13
, Issue.6
-
-
Samarati, P.1
-
35
-
-
69349086735
-
Genomic privacy and limits of individual detection in a pool
-
September
-
S. Sankararaman, G. Obozinski, M. I. Jordan, and E. Halperin. Genomic privacy and limits of individual detection in a pool. Nature genetics, 41(9):965-967, September 2009.
-
(2009)
Nature Genetics
, vol.41
, Issue.9
, pp. 965-967
-
-
Sankararaman, S.1
Obozinski, G.2
Jordan, M.I.3
Halperin, E.4
-
36
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. SIGMOD Rec., 33(1), 2004.
-
(2004)
SIGMOD Rec.
, vol.33
, Issue.1
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
37
-
-
2142754478
-
Association rule hiding
-
V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni. Association rule hiding. IEEE Trans. Knowl. Data Eng., 16(4), 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, Issue.4
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
-
38
-
-
43049091932
-
An efficient sanitization algorithm for balancing information privacy and knowledge discovery in association patterns mining
-
E. T. Wang and G. Lee. An efficient sanitization algorithm for balancing information privacy and knowledge discovery in association patterns mining. Data & Knowledge Engineering, 65(3), 2008.
-
(2008)
Data & Knowledge Engineering
, vol.65
, Issue.3
-
-
Wang, E.T.1
Lee, G.2
-
39
-
-
33749568934
-
Template-based privacy preservation in classification problems
-
K. Wang, B. Fung, and P. Yu. Template-based privacy preservation in classification problems. In ICDM, 2005.
-
(2005)
ICDM
-
-
Wang, K.1
Fung, B.2
Yu, P.3
-
40
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In VLDB, 2006.
-
(2006)
VLDB
-
-
Xiao, X.1
Tao, Y.2
-
41
-
-
70449464977
-
Differential privacy with compression
-
S. Zhou, K. Ligett, and L. Wasserman. Differential privacy with compression. In ISIT, 2009.
-
(2009)
ISIT
-
-
Zhou, S.1
Ligett, K.2
Wasserman, L.3
|