-
1
-
-
0242698195
-
On the design and quantification of privacy preserving datamining algorithms
-
D. Agrawal and C. Aggarwal. On the design and quantification of privacy preserving datamining algorithms. In Proc. PODS, 2001.
-
(2001)
Proc. PODS
-
-
Agrawal, D.1
Aggarwal, C.2
-
2
-
-
26944445962
-
Anonymizing tables
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. Technical report, Stanford University, 2004.
-
(2004)
Technical Report, Stanford University
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
7
-
-
0000301097
-
A greedy heuristic for the set-covering problem
-
Vasek Chvatal. A greedy heuristic for the set-covering problem. Mathematics of Operations Research, 4(3):233-235, 1979.
-
(1979)
Mathematics of Operations Research
, vol.4
, Issue.3
, pp. 233-235
-
-
Chvatal, V.1
-
8
-
-
0020205885
-
Auditing and inference control in statistical databases
-
F. Chin and G. Ozsoyoglu. Auditing and inference control in statistical databases. In IEEE TSE, 8(6), 1982.
-
(1982)
IEEE TSE
, vol.8
, Issue.6
-
-
Chin, F.1
Ozsoyoglu, G.2
-
9
-
-
84863340497
-
Signs outsourcing deal with IBM
-
Dec 30
-
J.P. Morgan signs outsourcing deal with IBM. ComputerWorld, Dec 30, 2002.
-
(2002)
ComputerWorld
-
-
Morgan, J.P.1
-
10
-
-
0018444418
-
Secure databases: Protection against user inuence
-
D. Dobkin, A. Jones, and R. Lipton. Secure databases: Protection against user inuence. In ACM TODS, 4(1), 1979.
-
(1979)
ACM TODS
, vol.4
, Issue.1
-
-
Dobkin, D.1
Jones, A.2
Lipton, R.3
-
11
-
-
34248222960
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In Proc. PODS, 2003.
-
(2003)
Proc. PODS
-
-
Dinur, I.1
Nissim, K.2
-
12
-
-
33244461250
-
Privacy-preserving datamining on vertically partitioned databases
-
C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In Proc. CRYPTO, 2004.
-
(2004)
Proc. CRYPTO
-
-
Dwork, C.1
Nissim, K.2
-
13
-
-
24944474471
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In Proc. PODS, 2003.
-
(2003)
Proc. PODS
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
16
-
-
0002337124
-
How to play any mental game - A completeness theorem for protocols with a honest majority
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - a completeness theorem for protocols with a honest majority. In Proc. STOC, 1987.
-
(1987)
Proc. STOC
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra. Executing sql over encrypted data in the database-service-provider model. In Proc. SIGMOD, 2002.
-
(2002)
Proc. SIGMOD
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
19
-
-
79955981313
-
Efficient execution of aggregation queries over encrypted relational databases
-
H. Hacigumus, B. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In Proc. DASFAA, 2004.
-
(2004)
Proc. DASFAA
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
-
23
-
-
0030197678
-
A new approach to the minimum cut problem
-
David Karger and Clifford Stein. A new approach to the minimum cut problem. Journal of the ACM, 43(4):601-640, July 1996. (Pubitemid 126582607)
-
(1996)
Journal of the ACM
, vol.43
, Issue.4
, pp. 601-640
-
-
Karger, D.R.1
Stein, C.2
-
25
-
-
33745587324
-
On the complexity of optimal k-anonymity
-
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In Proc. PODS, 2004.
-
(2004)
Proc. PODS
-
-
Meyerson, A.1
Williams, R.2
-
27
-
-
85051567368
-
Access path selection in a relational database management system
-
Patricia G. Selinger, Morton M. Astrahan, Donald D. Chamberlin, Raymond A. Lorie, and Thomas G. Price. Access path selection in a relational database management system. In Proc. SIGMOD, pages 23-34, 1979.
-
(1979)
Proc. SIGMOD
, pp. 23-34
-
-
Selinger, P.G.1
Astrahan, M.M.2
Chamberlin, D.D.3
Lorie, R.A.4
Price, T.G.5
-
28
-
-
34250622667
-
-
Sept.
-
California senate bill SB 1386. http://info.sen.ca.gov/pub/01-02/bill/ sen/sb-1351-1400/sb-1386-bill-20020926-chaptered.html, Sept. 2002.
-
(2002)
California Senate Bill SB 1386
-
-
-
32
-
-
0003113271
-
How to generate and exchange secrets
-
Andrew Yao. How to generate and exchange secrets. In Proc. FOCS, 1986.
-
(1986)
Proc. FOCS
-
-
Yao, A.1
|