메뉴 건너뛰기




Volumn , Issue , 2012, Pages 77-88

A rigorous and customizable framework for privacy

Author keywords

differential privacy; privacy

Indexed keywords

APPLICATION DOMAINS; CONTINUOUS ATTRIBUTE; CUSTOMIZABLE; DATA SHARING; DIFFERENTIAL PRIVACIES; PUFFERFISH;

EID: 84862624687     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2213556.2213571     Document Type: Conference Paper
Times cited : (143)

References (41)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases
    • N. Adam and J. Worthmann. Security-control methods for statistical databases. ACM Computing Surveys, 21(4):515-556, 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.1    Worthmann, J.2
  • 2
    • 33749553930 scopus 로고    scopus 로고
    • On privacy preservation against adversarial data mining
    • C. C. Aggarwal, J. Pei, and B. Zhang. On privacy preservation against adversarial data mining. In KDD, 2006.
    • (2006) KDD
    • Aggarwal, C.C.1    Pei, J.2    Zhang, B.3
  • 3
    • 57049136138 scopus 로고    scopus 로고
    • A learning theory approach to non-interactive database privacy
    • A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609-618, 2008.
    • (2008) STOC , pp. 609-618
    • Blum, A.1    Ligett, K.2    Roth, A.3
  • 4
    • 4043113529 scopus 로고    scopus 로고
    • The use of statistical methods in the U.S. Census: Utah v. Evans
    • DOI 10.1198/000313004X1189
    • P. J. Cantwell, H. Hogan, and K. M. Styles. The use of statistical methods in the u.s. census: Utah v. evans. The American Statistician, 58(3):203-212, 2004. (Pubitemid 39073360)
    • (2004) American Statistician , vol.58 , Issue.3 , pp. 203-212
    • Cantwell, P.J.1    Hogan, H.2    Styles, K.M.3
  • 5
    • 52649167640 scopus 로고    scopus 로고
    • When random sampling preserves privacy
    • K. Chaudhuri and N. Mishra. When random sampling preserves privacy. In CRYPTO, 2006.
    • (2006) CRYPTO
    • Chaudhuri, K.1    Mishra, N.2
  • 7
    • 0034497773 scopus 로고    scopus 로고
    • Using sample size to limit exposure to data mining
    • C. Clifton. Using sample size to limit exposure to data mining. Journal of Computer Security, 8(4), 2000.
    • (2000) Journal of Computer Security , vol.8 , Issue.4
    • Clifton, C.1
  • 10
    • 77954693419 scopus 로고    scopus 로고
    • A data perturbation approach to sensitive classification rule hiding
    • A. Delis, V. S. Verykios, and A. A. Tsitsonis. A data perturbation approach to sensitive classification rule hiding. In SAC, 2010.
    • (2010) SAC
    • Delis, A.1    Verykios, V.S.2    Tsitsonis, A.A.3
  • 11
    • 74549191363 scopus 로고    scopus 로고
    • Privacy without noise
    • Y. Duan. Privacy without noise. In CIKM, 2009.
    • (2009) CIKM
    • Duan, Y.1
  • 12
    • 50249086141 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork. Differential privacy. In ICALP, 2006.
    • (2006) ICALP
    • Dwork, C.1
  • 13
    • 33746086554 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, 2006.
    • (2006) TCC
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 14
    • 79959952201 scopus 로고    scopus 로고
    • On the difficulties of disclosure prevention in statistical databases or the case for differential privacy
    • C. Dwork and M. Naor. On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. JPC, 2(1), 2010.
    • (2010) JPC , vol.2 , Issue.1
    • Dwork, C.1    Naor, M.2
  • 16
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey on recent developments
    • B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey on recent developments. ACM Computing Surveys, 42(4), 2010.
    • (2010) ACM Computing Surveys , vol.42 , Issue.4
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 17
    • 65449162734 scopus 로고    scopus 로고
    • Composition attacks and auxiliary information in data privacy
    • S. R. Ganta, S. P. Kasiviswanathan, and A. Smith. Composition attacks and auxiliary information in data privacy. In KDD, 2008.
    • (2008) KDD
    • Ganta, S.R.1    Kasiviswanathan, S.P.2    Smith, A.3
  • 18
    • 85080535826 scopus 로고    scopus 로고
    • Towards privacy for social networks: A zero-knowledge based definition of privacy
    • J. Gehrke, E. Lui, and R. Pass. Towards privacy for social networks: A zero-knowledge based definition of privacy. In TCC, 2011.
    • (2011) TCC
    • Gehrke, J.1    Lui, E.2    Pass, R.3
  • 21
    • 77954711591 scopus 로고    scopus 로고
    • Towards an axiomatization of statistical privacy and utility
    • D. Kifer and B.-R. Lin. Towards an axiomatization of statistical privacy and utility. In PODS, 2010.
    • (2010) PODS
    • Kifer, D.1    Lin, B.-R.2
  • 26
    • 70849116921 scopus 로고    scopus 로고
    • Privacy integrated queries: An extensible platform for privacy-preserving data analysis
    • F. D. McSherry. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. In SIGMOD, pages 19-30, 2009.
    • (2009) SIGMOD , pp. 19-30
    • McSherry, F.D.1
  • 28
    • 39749135113 scopus 로고    scopus 로고
    • A maxmin approach for hiding frequent itemsets
    • G. V. Moustakides and V. S. Verykios. A maxmin approach for hiding frequent itemsets. Data Knowl. Eng., 65(1), 2008.
    • (2008) Data Knowl. Eng. , vol.65 , Issue.1
    • Moustakides, G.V.1    Verykios, V.S.2
  • 29
    • 37349036574 scopus 로고    scopus 로고
    • A reconstruction-based algorithm for classification rules hiding
    • J. Natwichai, X. Li, and M. E. Orlowska. A reconstruction-based algorithm for classification rules hiding. In ADC, 2006.
    • (2006) ADC
    • Natwichai, J.1    Li, X.2    Orlowska, M.E.3
  • 30
    • 35448955271 scopus 로고    scopus 로고
    • Smooth sensitivity and sampling in private data analysis
    • K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75-84, 2007.
    • (2007) STOC , pp. 75-84
    • Nissim, K.1    Raskhodnikova, S.2    Smith, A.3
  • 33
    • 70350635777 scopus 로고    scopus 로고
    • Relationship privacy: Output perturbation for queries with joins
    • V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: Output perturbation for queries with joins. In PODS, pages 107-116, 2009.
    • (2009) PODS , pp. 107-116
    • Rastogi, V.1    Hay, M.2    Miklau, G.3    Suciu, D.4
  • 34
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • P. Samarati. Protecting respondents' identities in microdata release. TKDE, 13(6), 2001.
    • (2001) TKDE , vol.13 , Issue.6
    • Samarati, P.1
  • 35
    • 69349086735 scopus 로고    scopus 로고
    • Genomic privacy and limits of individual detection in a pool
    • September
    • S. Sankararaman, G. Obozinski, M. I. Jordan, and E. Halperin. Genomic privacy and limits of individual detection in a pool. Nature genetics, 41(9):965-967, September 2009.
    • (2009) Nature Genetics , vol.41 , Issue.9 , pp. 965-967
    • Sankararaman, S.1    Obozinski, G.2    Jordan, M.I.3    Halperin, E.4
  • 38
    • 43049091932 scopus 로고    scopus 로고
    • An efficient sanitization algorithm for balancing information privacy and knowledge discovery in association patterns mining
    • E. T. Wang and G. Lee. An efficient sanitization algorithm for balancing information privacy and knowledge discovery in association patterns mining. Data & Knowledge Engineering, 65(3), 2008.
    • (2008) Data & Knowledge Engineering , vol.65 , Issue.3
    • Wang, E.T.1    Lee, G.2
  • 39
    • 33749568934 scopus 로고    scopus 로고
    • Template-based privacy preservation in classification problems
    • K. Wang, B. Fung, and P. Yu. Template-based privacy preservation in classification problems. In ICDM, 2005.
    • (2005) ICDM
    • Wang, K.1    Fung, B.2    Yu, P.3
  • 40
    • 84893853914 scopus 로고    scopus 로고
    • Anatomy: Simple and effective privacy preservation
    • X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In VLDB, 2006.
    • (2006) VLDB
    • Xiao, X.1    Tao, Y.2
  • 41
    • 70449464977 scopus 로고    scopus 로고
    • Differential privacy with compression
    • S. Zhou, K. Ligett, and L. Wasserman. Differential privacy with compression. In ISIT, 2009.
    • (2009) ISIT
    • Zhou, S.1    Ligett, K.2    Wasserman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.