메뉴 건너뛰기




Volumn 2, Issue 1, 2011, Pages 50-62

Model for a common notion of privacy leakage on public database

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84863678828     PISSN: 20935374     EISSN: 20935382     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (7)

References (51)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. R. Adam and J. C. Wortmann, "Security-control methods for statistical databases: A comparative study," ACM Computing Surveys, vol. 21, no. 4, pp. 515-556, 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortmann, J.C.2
  • 4
    • 35048813475 scopus 로고    scopus 로고
    • Data swapping: Variations on a theme by dalenius and reiss
    • Barcelona, Spain, LNCS, Springer-Verlag, June
    • S. E. Fienberg and J. McIntyre, "Data swapping: Variations on a theme by dalenius and reiss," in Proc. Of Privacy in Statistical Databases 2004 (PSD'04), Barcelona, Spain, LNCS, vol. 3050. Springer-Verlag, June 2004, pp. 14-29.
    • (2004) Proc. of Privacy In Statistical Databases 2004 (PSD'04) , vol.3050 , pp. 14-29
    • Fienberg, S.E.1    McIntyre, J.2
  • 5
    • 34250727770 scopus 로고    scopus 로고
    • Masking and re-identification methods for public-use microdata: Overview and research problems
    • Barcelona, Spain, LNCS, Springer-Verlag, June
    • W. E. Winkler, "Masking and re-identification methods for public-use microdata: Overview and research problems," in Proc. of Privacy in Statistical Databases 2004 (PSD'04), Barcelona, Spain, LNCS, vol. 3050. Springer-Verlag, June 2004, pp. 231-246.
    • (2004) Proc. of Privacy In Statistical Databases 2004 (PSD'04) , vol.3050 , pp. 231-246
    • Winkler, W.E.1
  • 6
    • 33746037200 scopus 로고    scopus 로고
    • Our data, ourselves: Privacy via distributed noise generation
    • Saint Petersburg, Russia, LNCS, SpringerVerlag, May-June
    • C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, "Our data, ourselves: Privacy via distributed noise generation," in Proc. of Eurocrypt 2006, Saint Petersburg, Russia, LNCS, vol. 4004. SpringerVerlag, May-June 2006, pp. 486-503.
    • (2006) Proc. of Eurocrypt 2006 , vol.4004 , pp. 486-503
    • Dwork, C.1    Kenthapadi, K.2    McSherry, F.3    Mironov, I.4    Naor, M.5
  • 11
    • 70350338483 scopus 로고    scopus 로고
    • Computational differential privacy
    • Santa Barbara, California, USA, LNCS, Springer-Verlag, August
    • I. Mironov, O. Pandey, O. Reingold, and S. Vadhan, "Computational differential privacy," in Proc. Of CRYPTO 2009, Santa Barbara, California, USA, LNCS, vol. 5677. Springer-Verlag, August 2009, pp. 126-142.
    • (2009) Proc. of CRYPTO 2009 , vol.5677 , pp. 126-142
    • Mironov, I.1    Pandey, O.2    Reingold, O.3    Vadhan, S.4
  • 13
    • 84886942299 scopus 로고    scopus 로고
    • Limits of computational differential privacy in the client/server setting
    • to appear, Brown University, USA, LNCS, Springer-Verlag, March
    • A. Groce, J. Katz, and A. Yerukhimovich, "Limits of computational differential privacy in the client/server setting," in Proc. of the 8th Theory of Cryptography Conference (TCC'11), to appear, Brown University, USA, LNCS. Springer-Verlag, March 2011.
    • Proc. of the 8th Theory of Cryptography Conference (TCC'11) , pp. 2011
    • Groce, A.1    Katz, J.2    Yerukhimovich, A.3
  • 15
    • 84860298839 scopus 로고    scopus 로고
    • Information-theoretic bounds for differentially private mechanisms
    • G. Barthe and B. Kopf, "Information-theoretic bounds for differentially private mechanisms," in IACR Cryptology ePrint Archive: Report 2011/071, http:// www.springerlink.com/ content/ c288812n57277k7r/, 2011.
    • (2011) IACR Cryptology EPrint Archive: Report 2011/071
    • Barthe, G.1    Kopf, B.2
  • 17
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • P. Samarati, "Protecting respondents' identities in microdata release," IEEE Trans. on Knowledge and Data Engineering, vol. 13, no. 6, pp. 1010-1027, 2001.
    • (2001) IEEE Trans. On Knowledge and Data Engineering , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 19
    • 0000072558 scopus 로고
    • Finding a needle in a haystack -or identifying anonymous census record
    • T. Dalenius, "Finding a needle in a haystack -or identifying anonymous census record," Journal of Official Statistics, vol. 2, no. 3, pp. 329-336, 1986.
    • (1986) Journal of Official Statistics , vol.2 , Issue.3 , pp. 329-336
    • Dalenius, T.1
  • 32
    • 41849123637 scopus 로고    scopus 로고
    • Utility-based anonymization for privacy preservation with less information loss
    • J. Xu and W. Wang and J. Pei, and X. Wang, and B. Shi, and A. W.-C. Fu, "Utility-based anonymization for privacy preservation with less information loss," SIGKDD Explor. Newsl., vol. 8, no. 2, pp. 21-30, 2006.
    • (2006) SIGKDD Explor. Newsl , vol.8 , Issue.2 , pp. 21-30
    • Xu, J.1    Wang, W.2    Pei, J.3    Wang, X.4    Shi, B.5    Fu A., W.-C.6
  • 34
    • 35248876111 scopus 로고    scopus 로고
    • K-anonymization incremental maintenance and optimization techniques
    • March Seoul, Korea. ACM Press
    • T. M. Truta and A. Campan, "K-anonymization incremental maintenance and optimization techniques," in Proc. of the 2007 ACM symposium on Applied computing (SAC'07), Seoul, Korea. ACM Press, March 2007, pp. 380-387.
    • (2007) Proc. of the 2007 ACM Symposium On Applied Computing (SAC'07) , pp. 380-387
    • Truta, T.M.1    Campan, A.2
  • 36
  • 43
    • 57749209112 scopus 로고    scopus 로고
    • A utility-theoretic approach to privacy and personalization
    • Chicago, USA, AAAI Press, July
    • A. Krause and E. Horvitz, "A utility-theoretic approach to privacy and personalization," in Proc. of AAAI'08, Chicago, USA, vol. 2. AAAI Press, July 2008, pp. 1181-1188.
    • (2008) Proc. of AAAI'08 , vol.2 , pp. 1181-1188
    • Krause, A.1    Horvitz, E.2
  • 44
    • 78651424764 scopus 로고    scopus 로고
    • A utility-theoretic approach to privacy in online services
    • A. Krause and E. Horvitz, "A utility-theoretic approach to privacy in online services," Journal of Artificial Intelligence Research, vol. 39, pp. 633-662, 2010.
    • (2010) Journal of Artificial Intelligence Research , vol.39 , pp. 633-662
    • Krause, A.1    Horvitz, E.2
  • 47
    • 33749566820 scopus 로고    scopus 로고
    • When random sampling preserves privacy
    • Santa Barbara, California, USA, LNCS, Springer-Verlag, August
    • K. Chaudhuri and N. Mishra, "When random sampling preserves privacy," in Proc. of CRYPTO 2006, Santa Barbara, California, USA, LNCS, vol. 4117. Springer-Verlag, August 2006, pp. 198-213.
    • (2006) Proc. of CRYPTO 2006 , vol.4117 , pp. 198-213
    • Chaudhuri, K.1    Mishra, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.