-
1
-
-
33845667955
-
Duplicate record detection: A survey
-
DOI 10.1109/TKDE.2007.250581
-
A.K. Elmagarmid, P.G. Ipeirotis, and V.S. Verykios, "Duplicate Record Detection: A Survey," IEEE Trans. Knowledge and Database Eng., vol. 19, no. 1, pp. 1-16, Jan. 2007. (Pubitemid 44955773)
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.1
, pp. 1-16
-
-
Elmagarmid, A.K.1
Ipeirotis, P.G.2
Verykios, V.S.3
-
2
-
-
34748816024
-
Privacy-preserving data integration and sharing
-
C. Clifton, M. Kantarciolu, A. Doan, G. Schadow, J. Vaidya, A. Elmagarmid, and D. Suciu, "Privacy-Preserving Data Integration and Sharing," Proc. Ninth ACM SIGMOD Workshop Research Issues in Data Mining and Knowledge Discovery (DMKD '04), pp. 19-26, 2004.
-
(2004)
Proc. Ninth ACM SIGMOD Workshop Research Issues in Data Mining and Knowledge Discovery (DMKD '04)
, pp. 19-26
-
-
Clifton, C.1
Kantarciolu, M.2
Doan, A.3
Schadow, G.4
Vaidya, J.5
Elmagarmid, A.6
Suciu, D.7
-
3
-
-
0032032036
-
How to ensure data security of an epidemiological follow-up:Quality assessment of an anonymous record linkage procedure
-
DOI 10.1016/S1386-5056(98)00019-7, PII S1386505698000197, Common Security Solutions for Communicating Patient Data
-
C. Quantin, H. Bouzelat, F. Allaert, A. Benhamiche, J. Faivre, and L. Dusserre, "How to Ensure Data Security of an Epidemiological Follow-Up: Quality Assessment of an Anonymous Record Linkage Procedure," Int'l J. Medical Informatics, vol. 49, no. 1, pp. 117-122, 1998. (Pubitemid 28353812)
-
(1998)
International Journal of Medical Informatics
, vol.49
, Issue.1
, pp. 117-122
-
-
Quantin, C.1
Bouzelat, H.2
Allaert, F.A.A.3
Benhamiche, A.M.4
Faivre, J.5
Dusserre, L.6
-
5
-
-
35448932873
-
Privacy preserving schema and data matching
-
DOI 10.1145/1247480.1247553, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
M. Scannapieco, I. Figotin, E. Bertino, and A.K. Elmagarmid, "Privacy Preserving Schema and Data Matching," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 653-664, 2007. (Pubitemid 47630842)
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 653-664
-
-
Scannapieco, M.1
Figotin, I.2
Bertino, E.3
Elmagarmid, A.K.4
-
6
-
-
77952259855
-
Blocking-aware private record linkage
-
A. Al-Lawati, D. Lee, and P. McDaniel, "Blocking-Aware Private Record Linkage," Proc. Second Int'l Workshop Information Quality in Information Systems (IQIS '05), pp. 59-68, 2005.
-
(2005)
Proc. Second Int'l Workshop Information Quality in Information Systems (IQIS '05)
, pp. 59-68
-
-
Al-Lawati, A.1
Lee, D.2
McDaniel, P.3
-
7
-
-
1142303699
-
Information sharing across private databases
-
R. Agrawal, A. Evfimievski, and R. Srikant, "Information Sharing across Private Databases," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 86-97, 2003.
-
(2003)
Proc.ACM SIGMOD Int'l Conf. Management of Data
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
8
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Proceedings - 21st International Conference on Data Engineering, ICDE 2005
-
B.C.M. Fung, K. Wang, and P.S. Yu, "Top-Down Specialization for Information and Privacy Preservation," Proc. 21st Int'l Conf. Data Eng. (ICDE '05), pp. 205-216, 2005. (Pubitemid 41731132)
-
(2005)
Proceedings - International Conference on Data Engineering
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
9
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
DOI 10.1142/S0218488502001648
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002. (Pubitemid 35384857)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
10
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "L-Diversity: Privacy Beyond K-Anonymity," Proc. 22nd Int'l Conf. Data Eng. (ICDE '06), p. 24, 2006.
-
(2006)
Proc. 22nd Int'l Conf. Data Eng. (ICDE '06)
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
12
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork, "Differential Privacy," Proc. Int'l Colloquium Automata, Languages and Programming (ICALP '02), pp. 1-12, 2006. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4052 LNCS
, pp. 1-12
-
-
Dwork, C.1
-
13
-
-
26444497804
-
General cryptographic protocols
-
Cambridge Univ. Press
-
O. Goldreich, "General Cryptographic Protocols," The Foundations of Cryptography, vol. 2, Cambridge Univ. Press, 2004.
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
14
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the Privacy Preserving Properties of Random Data Perturbation Techniques," Proc. IEEE Third Int'l Conf. Data Mining (ICDM '03), pp. 99-106, 2003.
-
(2003)
Proc. IEEE Third Int'l Conf. Data Mining (ICDM '03)
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
16
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
J. Vaidya and C. Clifton, "Secure Set Intersection Cardinality with Application to Association Rule Mining," J. Computer Security, vol. 13, no. 4, pp. 593-622, 2005. (Pubitemid 41499148)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.4
, pp. 593-622
-
-
Vaidya, J.1
Clifton, C.2
-
19
-
-
33749642794
-
Sovereign joins
-
R. Agrawal, D. Asonov, M. Kantarcioglu, and Y. Li, "Sovereign Joins," Proc. 22nd Int'l Conf. Data Eng. (ICDE '06), pp. 26-37, 2006.
-
(2006)
Proc. 22nd Int'l Conf. Data Eng. (ICDE '06)
, pp. 26-37
-
-
Agrawal, R.1
Asonov, D.2
Kantarcioglu, M.3
Li, Y.4
-
20
-
-
0036203458
-
TAILOR: A record linkage toolbox
-
M.G. Elfeky, A.K. Elmagarmid, and V.S. Verykios, "TAILOR: A Record Linkage Tool Box," Proc. 18th Int'l Conf. Data Eng. (ICDE '02), pp. 17-28, 2002. (Pubitemid 34278693)
-
(2002)
Proceedings - International Conference on Data Engineering
, pp. 17-28
-
-
Elfeky, M.G.1
Verykios, V.S.2
Elmagarmid, A.K.3
-
21
-
-
70349817125
-
Privacy-preserving record linkage using bloom filters
-
Aug.
-
R. Schnell, T. Bachteler, and J. Reiher, "Privacy-Preserving Record Linkage Using Bloom Filters," BMC Medical Informatics and Decision Making, vol. 9, no. 1, p. 41, Aug. 2009.
-
(2009)
BMC Medical Informatics and Decision Making
, vol.9
, Issue.1
, pp. 41
-
-
Schnell, R.1
Bachteler, T.2
Reiher, J.3
-
22
-
-
20444470394
-
Privacy-preserving data linkage protocols
-
WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
-
C.M. O'Keefe, M. Yung, L. Gu, and R. Baxter, "Privacy-Preserving Data Linkage Protocols," Proc. ACM Workshop Privacy in the Electronic Soc. (WPES '04), pp. 94-102, 2004. (Pubitemid 40821099)
-
(2004)
WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
, pp. 94-102
-
-
O'Keefe, C.M.1
Yung, M.2
Gu, L.3
Baxter, R.4
-
23
-
-
70349836319
-
Privacy preserving record linkage approaches
-
V.S. Verykios, A. Karakasidis, and V.K. Mitrogiannis, "Privacy Preserving Record Linkage Approaches," Int'l J. Data Mining, Modelling and Management, vol. 1, pp. 206-221, 2009.
-
(2009)
Int'l J. Data Mining, Modelling and Management
, vol.1
, pp. 206-221
-
-
Verykios, V.S.1
Karakasidis, A.2
Mitrogiannis, V.K.3
-
24
-
-
1642327704
-
Secure and private sequence comparisons
-
M.J. Atallah, F. Kerschbaum, and W. Du, "Secure and Private Sequence Comparisons," Proc. ACM Workshop Privacy in the Electronic Soc. (WPES '03), pp. 39-44, 2003.
-
(2003)
Proc.ACM Workshop Privacy in the Electronic Soc. (WPES '03)
, pp. 39-44
-
-
Atallah, M.J.1
Kerschbaum, F.2
Du, W.3
-
25
-
-
33749610153
-
Privacy preserving query processing using third parties
-
F. Emekci, D. Agrawal, A.E. Abbadi, and A. Gulbeden, "Privacy Preserving Query Processing Using Third Parties," Proc. 22nd Int'l Conf. Data Eng. (ICDE '06), 2006.
-
(2006)
Proc. 22nd Int'l Conf. Data Eng. (ICDE '06)
-
-
Emekci, F.1
Agrawal, D.2
Abbadi, A.E.3
Gulbeden, A.4
-
26
-
-
71749085624
-
Formal anonymity models for efficient privacy-preserving joins
-
M. Kantarcioglu, A. Inan, W. Jiang, and B. Malin, "Formal Anonymity Models for Efficient Privacy-Preserving Joins," Data and Knowledge Eng., vol. 68, no. 11, pp. 1206-1223, 2009.
-
(2009)
Data and Knowledge Eng.
, vol.68
, Issue.11
, pp. 1206-1223
-
-
Kantarcioglu, M.1
Inan, A.2
Jiang, W.3
Malin, B.4
-
27
-
-
52649087713
-
A hybrid approach to private record linkage
-
A. Inan, M. Kantarcioglu, E. Bertino, and M. Scannapieco, "A Hybrid Approach to Private Record Linkage," Proc. IEEE 24th Int'l Conf. Data Eng. (ICDE '08), pp. 496-505, 2008.
-
(2008)
Proc.IEEE 24th Int'l Conf. Data Eng. (ICDE '08)
, pp. 496-505
-
-
Inan, A.1
Kantarcioglu, M.2
Bertino, E.3
Scannapieco, M.4
-
28
-
-
77952279809
-
Private record matching using differential privacy
-
A. Inan, M. Kantarcioglu, G. Ghinita, and E. Bertino, "Private Record Matching Using Differential Privacy," Proc. 13th Int'l Conf. Extending Database Technology (EDBT '10), pp. 123-134, 2010.
-
(2010)
Proc. 13th Int'l Conf. Extending Database Technology (EDBT '10)
, pp. 123-134
-
-
Inan, A.1
Kantarcioglu, M.2
Ghinita, G.3
Bertino, E.4
-
29
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and ℓ-diversity
-
DOI 10.1109/ICDE.2007.367856, 4221659, 23rd International Conference on Data Engineering, ICDE 2007
-
N. Li, T. Li, and S. Venkatasubramanian, "T-Closeness: Privacy Beyond K-Anonymity and L-Diversity," Proc. IEEE 23rd Int'l Conf. Data Eng. (ICDE '07), pp. 106-115, 2007. (Pubitemid 47422014)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 106-115
-
-
Ninghui, L.1
Tiancheng, L.2
Venkatasubramanian, S.3
-
30
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
DOI 10.1007/11681878-14, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating Noise to Sensitivity in Private Data Analysis," Proc. Third Theory Computing Conf. (TCC), pp. 265-284, 2006. (Pubitemid 43979853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876 LNCS
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
31
-
-
70849091169
-
Output perturbation with query relaxation
-
X. Xiao and Y. Tao, "Output Perturbation with Query Relaxation," Proc. VLDB Endowment, vol. 1, no. 1, pp. 857-869, 2008.
-
(2008)
Proc. VLDB Endowment
, vol.1
, Issue.1
, pp. 857-869
-
-
Xiao, X.1
Tao, Y.2
-
32
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Jan.
-
C. Clifton, M. Kantarcoglu, X. Lin, J. Vaidya, and M. Zhu, "Tools for Privacy Preserving Distributed Data Mining," SIGKDD Explorations, vol. 4, no. 2, pp. 28-34, Jan. 2003.
-
(2003)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcoglu, M.2
Lin, X.3
Vaidya, J.4
Zhu, M.5
-
34
-
-
29844444250
-
Incognito: Efficient full-domain K-anonymity
-
DOI 10.1145/1066157.1066164, SIGMOD 2005: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, "Incognito: Efficient Full-Domain k-Anonymity," Proc. SIGMOD Int'l Conf. Management of Data, pp. 49-60, 2005. (Pubitemid 43038916)
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
35
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
K. Le Fevre, D.J. DeWitt, and R. Ramakrishnan, "Mondrian Multidimensional k-Anonymity," Proc. 22nd Int'l Conf. Data Eng. (ICDE '06), pp. 25-35, 2006.
-
(2006)
Proc. 22nd Int'l Conf. Data Eng. (ICDE '06)
, pp. 25-35
-
-
Le Fevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
|