-
2
-
-
34250661905
-
Achieving anonymity via clustering
-
DOI 10.1145/1142351.1142374, Proceedings of the Twenty-Fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2006
-
AGGARWAL, G., FEDER, T., KENTHAPADI, K., KHULLER, S., PANIGRAHY, R., THOMAS, D., and ZHU, A. 2006. Achieving anonymity via clustering. In Proceedings of the ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS'06). 153-162. (Pubitemid 46946477)
-
(2006)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
3
-
-
77049087087
-
Anonymizing tables
-
Lecture Notes in Computer Science, Springer
-
AGGARWAL, G., FEDER, T., KENTHAPADI, K., MOTWANI, R., PANIGRAHY, R., THOMAS, D., and ZHU, A. 2005. Anonymizing tables. In Proceedings of the International Conference on Database Technology (ICDT'05). Lecture Notes in Computer Science, vol. 3363, Springer, 246-258.
-
(2005)
Proceedings of the International Conference on Database Technology (ICDT'05)
, vol.3363
, pp. 246-258
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
9
-
-
38049041399
-
Efficient k-anonymization using clustering techniques
-
BYUN, J., KAMRA, A., BERTINO, E., and LI, N. 2007. Efficient k-anonymization using clustering techniques. In Proceedings of the International Conference on Database Systems for Advanced Applications (DAS-FAA'07).
-
(2007)
Proceedings of the International Conference on Database Systems for Advanced Applications (DAS-FAA'07)
-
-
Byun, J.1
Kamra, A.2
Bertino, E.3
Li, N.4
-
11
-
-
36048972384
-
Efficient multi-variate dataoriented microaggregation
-
DOMINGO-FERRER, J., MARTÍNEZ-BALLESTÉ, A., MATEO-SANZ, J., and SEBÉ, F. 2006. Efficient multi-variate dataoriented microaggregation. VLDB J. 15, 355-369.
-
(2006)
VLDB J
, vol.15
, pp. 355-369
-
-
Domingo-Ferrer, J.1
Martínez-Ballesté, A.2
Mateo-Sanz, J.3
Sebé, F.4
-
13
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
DOI 10.1007/11681878-14, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
DWORK, C., MCSHERRY, F., NISSIM, K., and SMITH, A. 2006. Calibrating noise to sensitivity in private data analysis. In Proceedings of the Technology, Colleges and Community Worldwide Online Conference (TCC'06). 265-284. (Pubitemid 43979853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876 LNCS
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
14
-
-
49249103738
-
Protecting privacy using k-anonymity
-
EMAM, K. E. and DANKAR, F. 2008. Protecting privacy using k-anonymity. J. Amer. Med. Inf. Assoc. 15, 627-637.
-
(2008)
J. Amer. Med. Inf. Assoc
, vol.15
, pp. 627-637
-
-
Emam, K.E.1
Dankar, F.2
-
15
-
-
69549114557
-
A globally optimal k-anonymity method for the de-identification of health information
-
EMAM, K. E., DANKAR, F., ISSA, R., JONKER, E., AMYOT, D., COGO, E., CORRIVEAU, J.-P., WALKER, M., CHOWDHURY, S., VAILLANCOURT, R., ROFFEY, T., and BOTTOMLEY, J. 2009. A globally optimal k-anonymity method for the de-identification of health information. J. Amer. Med. Inf. Assoc. 16, 670-682.
-
(2009)
J. Amer. Med. Inf. Assoc
, vol.16
, pp. 670-682
-
-
Emam, K.E.1
Dankar, F.2
Issa, R.3
Jonker, E.4
Amyot, D.5
Cogo, E.6
Corriveau, J.-P.7
Walker, M.8
Chowdhury, S.9
Vaillancourt, R.10
Roffey, T.11
Bottomley, J.12
-
16
-
-
0030150177
-
Comparing information without leaking it
-
FAGIN, R., NAOR, M., and WINKLER, P. 1996. Comparing information without leaking it. Comm. ACM 39, 77-85. (Pubitemid 126428128)
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
17
-
-
68649129111
-
A framework for efficient data anonymization under privacy and accuracy constraints
-
GHINITA, G., KARRAS, P., KALNIS, P., and MAMOULIS, N. 2009. A framework for efficient data anonymization under privacy and accuracy constraints. ACM Trans. Datab. Syst. 34.
-
(2009)
ACM Trans. Datab. Syst
, pp. 34
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
19
-
-
69549119179
-
K-Anonymization with minimal loss of information
-
GIONIS, A. and TASSA, T. 2009. K-Anonymization with minimal loss of information. IEEE Trans. Knowl. Data Engin. 21, 206-219.
-
(2009)
IEEE Trans. Knowl. Data Engin
, vol.21
, pp. 206-219
-
-
Gionis, A.1
Tassa, T.2
-
20
-
-
78651539208
-
Efficient anonymizations with enhanced utility
-
GOLDBERGER, J. and TASSA, T. 2010. Efficient anonymizations with enhanced utility. Trans. Data Privacy 3, 149-175.
-
(2010)
Trans. Data Privacy
, vol.3
, pp. 149-175
-
-
Goldberger, J.1
Tassa, T.2
-
23
-
-
36048997303
-
A secure distributed framework for achieving k-anonymity
-
JIANG, W. and CLIFTON, C. 2006. A secure distributed framework for achieving k-anonymity. VLDB J. 15, 316-333.
-
(2006)
VLDB J
, vol.15
, pp. 316-333
-
-
Jiang, W.1
Clifton, C.2
-
25
-
-
4544361334
-
Privacy-Preserving distributed mining of association rules on horizontally partitioned data
-
KANTARCIOGLU, M. and CLIFTON, C. 2004. Privacy-Preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Engin. 16, 1026-1037.
-
(2004)
IEEE Trans. Knowl. Data Engin
, vol.16
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
28
-
-
26444479778
-
Optimization by simulated annealing
-
KIRKPATRICK, S., JR., D. G. and VECCHI, M. 1983. Optimization by simulated annealing. Sci. 220, 4598, 671-680.
-
(1983)
Sci
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick, Jr.S.D.G.1
Vecchi, M.2
-
29
-
-
29844444250
-
Incognito: Efficient full-domain K-anonymity
-
DOI 10.1145/1066157.1066164, SIGMOD 2005: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
LEFEVRE, K., DEWITT, D., and RAMAKRISHNAN, R. 2005. Incognito: Efficient full-domain k-anonymity. In Proceedings of the ACM SIGMOD International Conference on Management of Data. 49-60. (Pubitemid 43038916)
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
31
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and ℓ-diversity
-
DOI 10.1109/ICDE.2007.367856, 4221659, 23rd International Conference on Data Engineering, ICDE 2007
-
LI, N., LI, T., and VENKATASUBRAMANIAN, S. 2007. T-Closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the International Conference on Data Engineering (ICDE'07). 106-115. (Pubitemid 47422014)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 106-115
-
-
Ninghui, L.1
Tiancheng, L.2
Venkatasubramanian, S.3
-
32
-
-
33749607006
-
L-Diversity: Privacy beyond k-anonymity
-
MACHANAVAJJHALA, A., GEHRKE, J., KIFER, D., and VENKITASUBRAMANIAM, M. 2006. L-Diversity: Privacy beyond k-anonymity. In Proceedings of the International Conference on Data Engineering (ICDE'06). 24.
-
(2006)
Proceedings of the International Conference on Data Engineering (ICDE'06)
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
34
-
-
70349096680
-
Privacy-Preserving data mashup
-
MOHAMMED, N., FUNG, B., WANG, K., and HUNG, P. 2009. Privacy-Preserving data mashup. In Proceedings of the International Conference on Extending Database Technology (EDBT'09).
-
(2009)
Proceedings of the International Conference on Extending Database Technology (EDBT'09)
-
-
Mohammed, N.1
Fung, B.2
Wang, K.3
Hung, P.4
-
37
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
DOI 10.1145/1250790.1250803, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
-
NISSIM, K., RASKHODNIKOVA, S., and SMITH, A. 2007. Smooth sensitivity and sampling in private data analysis. In Proceedings of the ACM Symposium on Theory of Computing (STOC'07). 75-84. (Pubitemid 47630723)
-
(2007)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
39
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
SAMARATI, P. 2001. Protecting respondent's privacy in microdata release. IEEE Trans. Knowl. Data Engin. 13, 1010-1027. (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
44
-
-
33749571958
-
(α, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing
-
KDD 2006: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
WONG, R., LI, J., FU, A., and WANG, K. 2006. (a, k)-Anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In Proceedings of the Annual ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'06). 754-759. (Pubitemid 44535586)
-
(2006)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, vol.2006
, pp. 754-759
-
-
Wong, R.C.-W.1
Li, J.2
Fu, A.W.-C.3
Wang, K.4
-
46
-
-
33749582207
-
Utility-based anonymization using local recoding
-
KDD 2006: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
XU, J., WANG, W., PEI, J., WANG, X., SHI, B., and FU, A.-C. 2006. Utility-Based anonymization using local recoding. In Proceedings of the Annual ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'06). 785-790. (Pubitemid 44535591)
-
(2006)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, vol.2006
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.-C.6
-
48
-
-
41549152568
-
Secure computation of the vector dominance problem
-
DOI 10.1007/978-3-540-79104-1-23, Information Security Practice and Experience - 4th International Conference, ISPEC 2008, Proceedings
-
YUAN, J., YE, Q., WANG, H., and PIEPRZYK, J. 2008. Secure computation of the vector dominance problem. In Proceedings of the IPSEC'08 Conference. 319-333. (Pubitemid 351465335)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4991 LNCS
, pp. 319-333
-
-
Yuan, J.1
Ye, Q.2
Wang, H.3
Pieprzyk, J.4
-
49
-
-
33244463520
-
Privacy-enhancing k-anonymization of customer data
-
Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2005
-
ZHONG, S., YANG, Z., and WRIGHT, R. 2005. Privacy-Enhancing k-anonymization of customer data. In Proceedings of the ACM Symposium on Principles of Database Systems (PODS'05). 139-147. (Pubitemid 43275477)
-
(2005)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 139-147
-
-
Zhong, S.1
Yang, Z.2
Wright, R.N.3
|