메뉴 건너뛰기




Volumn , Issue , 2013, Pages 165-176

A propagation model for provenance views of public/private workflows

Author keywords

Optimization; Privacy; Provenance; Workflows

Indexed keywords

DATA PRIVACY; OPTIMIZATION;

EID: 84875588154     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2448496.2448517     Document Type: Conference Paper
Times cited : (6)

References (40)
  • 1
    • 84903685823 scopus 로고    scopus 로고
    • https://www.dna20.com.
  • 2
    • 84903678147 scopus 로고    scopus 로고
    • http://www.smartgene.com.
  • 3
    • 84903663047 scopus 로고    scopus 로고
    • www.myexperiment.org.
  • 5
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
    • L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. In WWW, 2007.
    • (2007) WWW
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.M.3
  • 10
    • 51849083449 scopus 로고    scopus 로고
    • Scientific workflow provenance querying with security views
    • July
    • A. Chebotko, S. Chang, S. Lu, F. Fotouhi, and P. Yang. Scientific workflow provenance querying with security views. WAIM, pages 349-356, July 2008.
    • (2008) WAIM , pp. 349-356
    • Chebotko, A.1    Chang, S.2    Lu, S.3    Fotouhi, F.4    Yang, P.5
  • 11
    • 84861595370 scopus 로고    scopus 로고
    • Publishing set-valued data via differential privacy
    • R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. PVLDB, 4(11):1087-1098, 2011.
    • (2011) PVLDB , vol.4 , Issue.11 , pp. 1087-1098
    • Chen, R.1    Mohammed, N.2    Fung, B.C.M.3    Desai, B.C.4    Xiong, L.5
  • 14
    • 80052688705 scopus 로고    scopus 로고
    • Personal privacy vs population privacy: Learning to attack anonymization
    • G. Cormode. Personal privacy vs population privacy: learning to attack anonymization. In KDD, pages 1253-1261, 2011.
    • (2011) KDD , pp. 1253-1261
    • Cormode, G.1
  • 15
    • 84875612288 scopus 로고    scopus 로고
    • Differentially private publication of sparse data
    • abs/1103.0825
    • G. Cormode, C. M. Procopiuc, D. Srivastava, and T. T. L. Tran. Differentially private publication of sparse data. CoRR, abs/1103.0825, 2011.
    • (2011) CoRR
    • Cormode, G.1    Procopiuc, C.M.2    Srivastava, D.3    Tran, T.T.L.4
  • 16
    • 84859258582 scopus 로고    scopus 로고
    • Minimizing minimality and maximizing utility: Analyzing method-based attacks on anonymized data
    • Sept.
    • G. Cormode, D. Srivastava, N. Li, and T. Li. Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data. Proc. VLDB Endow., 3(1-2):1045-1056, Sept. 2010.
    • (2010) Proc. VLDB Endow. , vol.3 , Issue.1-2 , pp. 1045-1056
    • Cormode, G.1    Srivastava, D.2    Li, N.3    Li, T.4
  • 19
    • 84875590344 scopus 로고    scopus 로고
    • A propagation model for provenance views of public/private workflows
    • abs/1212.2251
    • S. B. Davidson, T. Milo, and S. Roy. A propagation model for provenance views of public/private workflows. CoRR, abs/1212.2251, 2012.
    • (2012) CoRR
    • Davidson, S.B.1    Milo, T.2    Roy, S.3
  • 20
    • 79960199402 scopus 로고    scopus 로고
    • A quest for beauty and wealth (or, business processes for database researchers)
    • D. Deutch and T. Milo. A quest for beauty and wealth (or, business processes for database researchers). In PODS, pages 1-12, 2011.
    • (2011) PODS , pp. 1-12
    • Deutch, D.1    Milo, T.2
  • 21
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • C. Dwork. Differential privacy: A survey of results. In TAMC'08, pages 1-19.
    • TAMC'08 , pp. 1-19
    • Dwork, C.1
  • 22
    • 70350645515 scopus 로고    scopus 로고
    • The differential privacy frontier (extended abstract)
    • C. Dwork. The differential privacy frontier (extended abstract). In TCC, pages 496-502, 2009.
    • (2009) TCC , pp. 496-502
    • Dwork, C.1
  • 23
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • Springer
    • C. Dwork, F. Mcsherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284. Springer, 2006.
    • (2006) TCC , pp. 265-284
    • Dwork, C.1    Mcsherry, F.2    Nissim, K.3    Smith, A.4
  • 26
    • 65449162734 scopus 로고    scopus 로고
    • Composition attacks and auxiliary information in data privacy
    • S. R. Ganta, S. P. Kasiviswanathan, and A. Smith. Composition attacks and auxiliary information in data privacy. In KDD, pages 265-273, 2008.
    • (2008) KDD , pp. 265-273
    • Ganta, S.R.1    Kasiviswanathan, S.P.2    Smith, A.3
  • 27
    • 83455177222 scopus 로고    scopus 로고
    • Having your cake and eating it too: Routing security with privacy protections
    • A. J. T. Gurney, A. Haeberlen, W. Zhou, M. Sherr, and B. T. Loo. Having your cake and eating it too: Routing security with privacy protections. In HotNets'11.
    • HotNets'11
    • Gurney, A.J.T.1    Haeberlen, A.2    Zhou, W.3    Sherr, M.4    Loo, B.T.5
  • 28
    • 70849111568 scopus 로고    scopus 로고
    • Attacks on privacy and definetti's theorem
    • D. Kifer. Attacks on privacy and definetti's theorem. In SIGMOD, pages 127-138, 2009.
    • (2009) SIGMOD , pp. 127-138
    • Kifer, D.1
  • 29
    • 79959983519 scopus 로고    scopus 로고
    • No free lunch in data privacy
    • D. Kifer and A. Machanavajjhala. No free lunch in data privacy. In SIGMOD, pages 193-204, 2011.
    • (2011) SIGMOD , pp. 193-204
    • Kifer, D.1    Machanavajjhala, A.2
  • 31
    • 46749128577 scopus 로고    scopus 로고
    • Mechanism design via differential privacy
    • Washington, DC, USA, IEEE Computer Society
    • F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, pages 94-103, Washington, DC, USA, 2007. IEEE Computer Society.
    • (2007) FOCS , pp. 94-103
    • Mcsherry, F.1    Talwar, K.2
  • 37
    • 85011016303 scopus 로고    scopus 로고
    • Minimality attack in privacy preserving data publishing
    • R. C.-W. Wong, A. W.-C. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In VLDB, pages 543-554, 2007.
    • (2007) VLDB , pp. 543-554
    • Wong, R.C.-W.1    Fu, A.W.-C.2    Wang, K.3    Pei, J.4
  • 38
    • 77952081925 scopus 로고    scopus 로고
    • Transparent anonymization: Thwarting adversaries who know the algorithm
    • 8:1-8:48, May
    • X. Xiao, Y. Tao, and N. Koudas. Transparent anonymization: Thwarting adversaries who know the algorithm. ACM Trans. Database Syst., 35(2):8:1-8:48, May 2010.
    • (2010) ACM Trans. Database Syst. , vol.35 , Issue.2
    • Xiao, X.1    Tao, Y.2    Koudas, N.3
  • 39
    • 77952787160 scopus 로고    scopus 로고
    • Differential privacy via wavelet transforms
    • X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. In ICDE, pages 225-236, 2010.
    • (2010) ICDE , pp. 225-236
    • Xiao, X.1    Wang, G.2    Gehrke, J.3
  • 40
    • 33745599656 scopus 로고    scopus 로고
    • Checking for k-anonymity violation by views
    • C. Yao, X. S. Wang, and S. Jajodia. Checking for k-anonymity violation by views. In VLDB, pages 910-921, 2005.
    • (2005) VLDB , pp. 910-921
    • Yao, C.1    Wang, X.S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.