-
1
-
-
84903685823
-
-
https://www.dna20.com.
-
-
-
-
2
-
-
84903678147
-
-
http://www.smartgene.com.
-
-
-
-
3
-
-
84903663047
-
-
www.myexperiment.org.
-
-
-
-
5
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. In WWW, 2007.
-
(2007)
WWW
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.M.3
-
6
-
-
84863453013
-
Surrogate parenthood: Protected and informative graphs
-
B. T. Blaustein, A. Chapman, L. Seligman, M. D. Allen, and A. Rosenthal. Surrogate parenthood: Protected and informative graphs. PVLDB, 4(8):518-527, 2011.
-
(2011)
PVLDB
, vol.4
, Issue.8
, pp. 518-527
-
-
Blaustein, B.T.1
Chapman, A.2
Seligman, L.3
Allen, M.D.4
Rosenthal, A.5
-
8
-
-
79952802649
-
A language for provenance access control
-
T. Cadenhead, V. Khadilkar, M. Kantarcioglu, and B. M. Thuraisingham. A language for provenance access control. In CODASPY, pages 133-144, 2011.
-
(2011)
CODASPY
, pp. 133-144
-
-
Cadenhead, T.1
Khadilkar, V.2
Kantarcioglu, M.3
Thuraisingham, B.M.4
-
9
-
-
79960162956
-
Transforming provenance using redaction
-
T. Cadenhead, V. Khadilkar, M. Kantarcioglu, and B. M. Thuraisingham. Transforming provenance using redaction. In SACMAT, pages 93-102, 2011.
-
(2011)
SACMAT
, pp. 93-102
-
-
Cadenhead, T.1
Khadilkar, V.2
Kantarcioglu, M.3
Thuraisingham, B.M.4
-
10
-
-
51849083449
-
Scientific workflow provenance querying with security views
-
July
-
A. Chebotko, S. Chang, S. Lu, F. Fotouhi, and P. Yang. Scientific workflow provenance querying with security views. WAIM, pages 349-356, July 2008.
-
(2008)
WAIM
, pp. 349-356
-
-
Chebotko, A.1
Chang, S.2
Lu, S.3
Fotouhi, F.4
Yang, P.5
-
11
-
-
84861595370
-
Publishing set-valued data via differential privacy
-
R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. PVLDB, 4(11):1087-1098, 2011.
-
(2011)
PVLDB
, vol.4
, Issue.11
, pp. 1087-1098
-
-
Chen, R.1
Mohammed, N.2
Fung, B.C.M.3
Desai, B.C.4
Xiong, L.5
-
14
-
-
80052688705
-
Personal privacy vs population privacy: Learning to attack anonymization
-
G. Cormode. Personal privacy vs population privacy: learning to attack anonymization. In KDD, pages 1253-1261, 2011.
-
(2011)
KDD
, pp. 1253-1261
-
-
Cormode, G.1
-
16
-
-
84859258582
-
Minimizing minimality and maximizing utility: Analyzing method-based attacks on anonymized data
-
Sept.
-
G. Cormode, D. Srivastava, N. Li, and T. Li. Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data. Proc. VLDB Endow., 3(1-2):1045-1056, Sept. 2010.
-
(2010)
Proc. VLDB Endow.
, vol.3
, Issue.1-2
, pp. 1045-1056
-
-
Cormode, G.1
Srivastava, D.2
Li, N.3
Li, T.4
-
17
-
-
79960191413
-
Provenance views for module privacy
-
S. B. Davidson, S. Khanna, T. Milo, D. Panigrahi, and S. Roy. Provenance views for module privacy. In PODS, pages 175-186, 2011.
-
(2011)
PODS
, pp. 175-186
-
-
Davidson, S.B.1
Khanna, S.2
Milo, T.3
Panigrahi, D.4
Roy, S.5
-
18
-
-
79952335883
-
On provenance and privacy
-
S. B. Davidson, S. Khanna, S. Roy, J. Stoyanovich, V. Tannen, and Y. Chen. On provenance and privacy. In ICDT, pages 3-10, 2011.
-
(2011)
ICDT
, pp. 3-10
-
-
Davidson, S.B.1
Khanna, S.2
Roy, S.3
Stoyanovich, J.4
Tannen, V.5
Chen, Y.6
-
19
-
-
84875590344
-
A propagation model for provenance views of public/private workflows
-
abs/1212.2251
-
S. B. Davidson, T. Milo, and S. Roy. A propagation model for provenance views of public/private workflows. CoRR, abs/1212.2251, 2012.
-
(2012)
CoRR
-
-
Davidson, S.B.1
Milo, T.2
Roy, S.3
-
20
-
-
79960199402
-
A quest for beauty and wealth (or, business processes for database researchers)
-
D. Deutch and T. Milo. A quest for beauty and wealth (or, business processes for database researchers). In PODS, pages 1-12, 2011.
-
(2011)
PODS
, pp. 1-12
-
-
Deutch, D.1
Milo, T.2
-
21
-
-
70349305273
-
Differential privacy: A survey of results
-
C. Dwork. Differential privacy: A survey of results. In TAMC'08, pages 1-19.
-
TAMC'08
, pp. 1-19
-
-
Dwork, C.1
-
22
-
-
70350645515
-
The differential privacy frontier (extended abstract)
-
C. Dwork. The differential privacy frontier (extended abstract). In TCC, pages 496-502, 2009.
-
(2009)
TCC
, pp. 496-502
-
-
Dwork, C.1
-
23
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer
-
C. Dwork, F. Mcsherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284. Springer, 2006.
-
(2006)
TCC
, pp. 265-284
-
-
Dwork, C.1
Mcsherry, F.2
Nissim, K.3
Smith, A.4
-
24
-
-
79960173817
-
Pan-private streaming algorithms
-
C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin. Pan-private streaming algorithms. In ICS, pages 66-80, 2010.
-
(2010)
ICS
, pp. 66-80
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.N.4
Yekhanin, S.5
-
26
-
-
65449162734
-
Composition attacks and auxiliary information in data privacy
-
S. R. Ganta, S. P. Kasiviswanathan, and A. Smith. Composition attacks and auxiliary information in data privacy. In KDD, pages 265-273, 2008.
-
(2008)
KDD
, pp. 265-273
-
-
Ganta, S.R.1
Kasiviswanathan, S.P.2
Smith, A.3
-
28
-
-
70849111568
-
Attacks on privacy and definetti's theorem
-
D. Kifer. Attacks on privacy and definetti's theorem. In SIGMOD, pages 127-138, 2009.
-
(2009)
SIGMOD
, pp. 127-138
-
-
Kifer, D.1
-
29
-
-
79959983519
-
No free lunch in data privacy
-
D. Kifer and A. Machanavajjhala. No free lunch in data privacy. In SIGMOD, pages 193-204, 2011.
-
(2011)
SIGMOD
, pp. 193-204
-
-
Kifer, D.1
Machanavajjhala, A.2
-
31
-
-
46749128577
-
Mechanism design via differential privacy
-
Washington, DC, USA, IEEE Computer Society
-
F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, pages 94-103, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
FOCS
, pp. 94-103
-
-
Mcsherry, F.1
Talwar, K.2
-
32
-
-
84862604885
-
Towards robustness in query auditing
-
S. U. Nabar, B. Marthi, K. Kenthapadi, N. Mishra, and R. Motwani. Towards robustness in query auditing. In VLDB, pages 151-162, 2006.
-
(2006)
VLDB
, pp. 151-162
-
-
Nabar, S.U.1
Marthi, B.2
Kenthapadi, K.3
Mishra, N.4
Motwani, R.5
-
33
-
-
70349885378
-
An access control language for a general provenance model
-
Q. Ni, S. Xu, E. Bertino, R. S. Sandhu, and W. Han. An access control language for a general provenance model. In Secure Data Management'09, pages 68-88.
-
Secure Data Management'09
, pp. 68-88
-
-
Ni, Q.1
Xu, S.2
Bertino, E.3
Sandhu, R.S.4
Han, W.5
-
35
-
-
33750087260
-
Security issues in a SOA-based provenance system
-
V. Tan, P. T. Groth, S. Miles, S. Jiang, S. Munroe, S. Tsasakou, and L. Moreau. Security issues in a SOA-based provenance system. In IPAW'06, pages 203-211.
-
IPAW'06
, pp. 203-211
-
-
Tan, V.1
Groth, P.T.2
Miles, S.3
Jiang, S.4
Munroe, S.5
Tsasakou, S.6
Moreau, L.7
-
36
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. SIGMOD Rec., 33(1):50-57, 2004.
-
(2004)
SIGMOD Rec.
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
37
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
R. C.-W. Wong, A. W.-C. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In VLDB, pages 543-554, 2007.
-
(2007)
VLDB
, pp. 543-554
-
-
Wong, R.C.-W.1
Fu, A.W.-C.2
Wang, K.3
Pei, J.4
-
38
-
-
77952081925
-
Transparent anonymization: Thwarting adversaries who know the algorithm
-
8:1-8:48, May
-
X. Xiao, Y. Tao, and N. Koudas. Transparent anonymization: Thwarting adversaries who know the algorithm. ACM Trans. Database Syst., 35(2):8:1-8:48, May 2010.
-
(2010)
ACM Trans. Database Syst.
, vol.35
, Issue.2
-
-
Xiao, X.1
Tao, Y.2
Koudas, N.3
-
39
-
-
77952787160
-
Differential privacy via wavelet transforms
-
X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. In ICDE, pages 225-236, 2010.
-
(2010)
ICDE
, pp. 225-236
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
40
-
-
33745599656
-
Checking for k-anonymity violation by views
-
C. Yao, X. S. Wang, and S. Jajodia. Checking for k-anonymity violation by views. In VLDB, pages 910-921, 2005.
-
(2005)
VLDB
, pp. 910-921
-
-
Yao, C.1
Wang, X.S.2
Jajodia, S.3
|