메뉴 건너뛰기




Volumn 9, Issue 5, 2012, Pages 684-698

A hybrid approach to private record matching

Author keywords

anonymization; differential privacy; Privacy; record matching; security

Indexed keywords

CRYPTOGRAPHY; ECONOMIC AND SOCIAL EFFECTS;

EID: 84864774329     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2012.46     Document Type: Article
Times cited : (15)

References (35)
  • 3
    • 0032032036 scopus 로고    scopus 로고
    • How to ensure data security of an epidemiological follow-up:Quality assessment of an anonymous record linkage procedure
    • DOI 10.1016/S1386-5056(98)00019-7, PII S1386505698000197, Common Security Solutions for Communicating Patient Data
    • C. Quantin, H. Bouzelat, F. Allaert, A. Benhamiche, J. Faivre, and L. Dusserre, "How to Ensure Data Security of an Epidemiological Follow-Up: Quality Assessment of an Anonymous Record Linkage Procedure," Int'l J. Medical Informatics, vol. 49, no. 1, pp. 117-122, 1998. (Pubitemid 28353812)
    • (1998) International Journal of Medical Informatics , vol.49 , Issue.1 , pp. 117-122
    • Quantin, C.1    Bouzelat, H.2    Allaert, F.A.A.3    Benhamiche, A.M.4    Faivre, J.5    Dusserre, L.6
  • 8
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • Proceedings - 21st International Conference on Data Engineering, ICDE 2005
    • B.C.M. Fung, K. Wang, and P.S. Yu, "Top-Down Specialization for Information and Privacy Preservation," Proc. 21st Int'l Conf. Data Eng. (ICDE '05), pp. 205-216, 2005. (Pubitemid 41731132)
    • (2005) Proceedings - International Conference on Data Engineering , pp. 205-216
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 13
    • 26444497804 scopus 로고    scopus 로고
    • General cryptographic protocols
    • Cambridge Univ. Press
    • O. Goldreich, "General Cryptographic Protocols," The Foundations of Cryptography, vol. 2, Cambridge Univ. Press, 2004.
    • (2004) The Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 16
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • J. Vaidya and C. Clifton, "Secure Set Intersection Cardinality with Application to Association Rule Mining," J. Computer Security, vol. 13, no. 4, pp. 593-622, 2005. (Pubitemid 41499148)
    • (2005) Journal of Computer Security , vol.13 , Issue.4 , pp. 593-622
    • Vaidya, J.1    Clifton, C.2
  • 26
    • 71749085624 scopus 로고    scopus 로고
    • Formal anonymity models for efficient privacy-preserving joins
    • M. Kantarcioglu, A. Inan, W. Jiang, and B. Malin, "Formal Anonymity Models for Efficient Privacy-Preserving Joins," Data and Knowledge Eng., vol. 68, no. 11, pp. 1206-1223, 2009.
    • (2009) Data and Knowledge Eng. , vol.68 , Issue.11 , pp. 1206-1223
    • Kantarcioglu, M.1    Inan, A.2    Jiang, W.3    Malin, B.4
  • 31
    • 70849091169 scopus 로고    scopus 로고
    • Output perturbation with query relaxation
    • X. Xiao and Y. Tao, "Output Perturbation with Query Relaxation," Proc. VLDB Endowment, vol. 1, no. 1, pp. 857-869, 2008.
    • (2008) Proc. VLDB Endowment , vol.1 , Issue.1 , pp. 857-869
    • Xiao, X.1    Tao, Y.2
  • 32
    • 10044273842 scopus 로고    scopus 로고
    • Tools for privacy preserving distributed data mining
    • Jan.
    • C. Clifton, M. Kantarcoglu, X. Lin, J. Vaidya, and M. Zhu, "Tools for Privacy Preserving Distributed Data Mining," SIGKDD Explorations, vol. 4, no. 2, pp. 28-34, Jan. 2003.
    • (2003) SIGKDD Explorations , vol.4 , Issue.2 , pp. 28-34
    • Clifton, C.1    Kantarcoglu, M.2    Lin, X.3    Vaidya, J.4    Zhu, M.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.