-
2
-
-
0024914229
-
Security-control methods for statistical databases
-
Nabil Adam and John Worthmann. Security-control methods for statistical databases. ACM Computing Surveys, 21(4):515-556, 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.1
Worthmann, J.2
-
3
-
-
52649088231
-
On unifying privacy and uncertain data models
-
Charu C. Aggarwal. On unifying privacy and uncertain data models. In ICDE, 2008.
-
(2008)
ICDE
-
-
Aggarwal, C.C.1
-
4
-
-
79960012182
-
-
http://arxiv.org/abs/1103.5188
-
Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano, and Catuscia Palamidessi. Differential privacy: on the trade-off between utility and information leakage. http://arxiv.org/abs/1103.5188, 2011.
-
(2011)
Differential Privacy: On the Trade-off Between Utility and Information Leakage
-
-
Alvim, M.S.1
Andrés, M.E.2
Chatzikokolakis, K.3
Degano, P.4
Palamidessi, C.5
-
5
-
-
84878279346
-
On the relation between differential privacy and quantitative information flow
-
Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. On the relation between differential privacy and quantitative information flow. In ICALP, 2011.
-
(2011)
ICALP
-
-
Alvim, M.S.1
Andrés, M.E.2
Chatzikokolakis, K.3
Palamidessi, C.4
-
6
-
-
85139848530
-
An information theoretic privacy and utility measure for data sanitization mechanisms
-
Mina Askari, Reihaneh Safavi-Naini, and Ken Barker. An information theoretic privacy and utility measure for data sanitization mechanisms. In CODASPY, 2012.
-
(2012)
CODASPY
-
-
Askari, M.1
Safavi-Naini, R.2
Barker, K.3
-
7
-
-
35448955720
-
Privacy, accuracy and consistency too: A holistic solution to contingency table release
-
Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Satyen Kale, Frank McSherry, and Kunal Talwar. Privacy, accuracy and consistency too: A holistic solution to contingency table release. In PODS, 2007.
-
(2007)
PODS
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
10
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
Avrim Blum, Cynthia Dwork, Frank McSherry, and Kobbi Nissim. Practical privacy: the SuLQ framework. In PODS, pages 128-138, 2005.
-
(2005)
PODS
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
11
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
Avrim Blum, Katrina Ligett, and Aaron Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609-618, 2008.
-
(2008)
STOC
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
13
-
-
77954718437
-
Privacy-preserving data publishing
-
Bee-Chung Chen, Daniel Kifer, Kristen LeFevre, and Ashwin Machanavajjhala. Privacy-preserving data publishing. Foundations and Trends in Databases, 2(1-2):1-167, 2009.
-
(2009)
Foundations and Trends in Databases
, vol.2
, Issue.1-2
, pp. 1-167
-
-
Chen, B.-C.1
Kifer, D.2
LeFevre, K.3
Machanavajjhala, A.4
-
14
-
-
79959954388
-
Differentially private data cubes: Optimizing noise sources and consistency
-
Bolin Ding, Marianne Winslett, Jiawei Han, and Zhenhui Li. Differentially private data cubes: optimizing noise sources and consistency. In SIGMOD, 2011.
-
(2011)
SIGMOD
-
-
Ding, B.1
Winslett, M.2
Han, J.3
Li, Z.4
-
15
-
-
1142275486
-
Revealing information while preserving privacy
-
Irit Dinur and Kobbi Nissim. Revealing information while preserving privacy. In PODS, 2003.
-
(2003)
PODS
-
-
Dinur, I.1
Nissim, K.2
-
16
-
-
33746086554
-
Calibrating noise to sensitivity in private data analysis
-
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In TCC, 2006.
-
(2006)
TCC
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
17
-
-
70350689921
-
On the complexity of differentially private data release: Efficient algorithms and hardness results
-
Cynthia Dwork, Moni Naor, Omer Reingold, Guy N. Rothblum, and Salil Vadhan. On the complexity of differentially private data release: Efficient algorithms and hardness results. In STOC, 2009.
-
(2009)
STOC
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.N.4
Vadhan, S.5
-
19
-
-
77951201056
-
Privacy-preserving data publishing: A survey on recent developments
-
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey on recent developments. ACM Computing Surveys, 42(4), 2010.
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
20
-
-
0004012196
-
-
Chapman & Hall/CRC, 2nd edition
-
A. Gelman, J. B. Carlin, H. S. Stern, and D. B. Rubin. Bayesian Data Analysis. Chapman & Hall/CRC, 2nd edition, 2003.
-
(2003)
Bayesian Data Analysis
-
-
Gelman, A.1
Carlin, J.B.2
Stern, H.S.3
Rubin, D.B.4
-
21
-
-
79959622530
-
Selling privacy at auction
-
Arpita Ghosh and Aaron Roth. Selling privacy at auction. In EC, 2011.
-
(2011)
EC
-
-
Ghosh, A.1
Roth, A.2
-
22
-
-
70350683770
-
Universally utility-maximizing privacy mechanisms
-
Arpita Ghosh, Tim Roughgarden, and Mukund Sundararajan. Universally utility-maximizing privacy mechanisms. In STOC, 2009.
-
(2009)
STOC
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
23
-
-
77954735969
-
Universally optimal privacy mechanisms for minimax agents
-
Mangesh Gupte and Mukund Sundararajan. Universally optimal privacy mechanisms for minimax agents. In PODS, 2010.
-
(2010)
PODS
-
-
Gupte, M.1
Sundararajan, M.2
-
24
-
-
78650518102
-
Boosting the accuracy of differentially-private histograms through consistency
-
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially-private histograms through consistency. In VLDB, 2010.
-
(2010)
VLDB
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
25
-
-
67649666659
-
Using anonymized data for classification
-
Ali Inan, Murat Kantarcioglu, and Elisa Bertino. Using anonymized data for classification. In ICDE, 2009.
-
(2009)
ICDE
-
-
Inan, A.1
Kantarcioglu, M.2
Bertino, E.3
-
26
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Vijay S. Iyengar. Transforming data to satisfy privacy constraints. In KDD, 2002.
-
(2002)
KDD
-
-
Iyengar, V.S.1
-
27
-
-
77954711591
-
Towards an axiomatization of statistical privacy and utility
-
Daniel Kifer and Bing-Rong Lin. Towards an axiomatization of statistical privacy and utility. In PODS, 2010.
-
(2010)
PODS
-
-
Kifer, D.1
Lin, B.-R.2
-
29
-
-
77954715960
-
Optimizing linear counting queries under differential privacy
-
Chao Li, Michael Hay, Vibhor Rastogi, Gerome Miklau, and Andrew McGregor. Optimizing linear counting queries under differential privacy. In PODS, 2010.
-
(2010)
PODS
-
-
Li, C.1
Hay, M.2
Rastogi, V.3
Miklau, G.4
McGregor, A.5
-
31
-
-
0000185822
-
Statistical analysis of masked data
-
Roderick J.A. Little. Statistical analysis of masked data. Journal of Official Statistics, 9(2):407-426, 1993.
-
(1993)
Journal of Official Statistics
, vol.9
, Issue.2
, pp. 407-426
-
-
Little, R.J.A.1
-
32
-
-
46749128577
-
Mechanism design via differential privacy
-
Frank McSherry and Kunal Talwar. Mechanism design via differential privacy. In FOCS, 2007.
-
(2007)
FOCS
-
-
McSherry, F.1
Talwar, K.2
-
33
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
Frank D. McSherry. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. In SIGMOD, pages 19-30, 2009.
-
(2009)
SIGMOD
, pp. 19-30
-
-
McSherry, F.D.1
-
37
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257-286, 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
39
-
-
85011019712
-
The boundary between privacy and utility in data publishing
-
Vibhor Rastogi, Dan Suciu, and Sungho Hong. The boundary between privacy and utility in data publishing. In VLDB, 2007.
-
(2007)
VLDB
-
-
Rastogi, V.1
Suciu, D.2
Hong, S.3
-
40
-
-
36148937800
-
Using cart to generate partially synthetic public use microdata
-
J.P. Reiter. Using cart to generate partially synthetic public use microdata. Journal of Official Statistics, pages 441-462, 2005.
-
(2005)
Journal of Official Statistics
, pp. 441-462
-
-
Reiter, J.P.1
-
41
-
-
0000281816
-
On estimating monotone parameters
-
Tim Robertson and Paul Waltman. On estimating monotone parameters. Ann. Math. Statist., 39(3):1030-1039, 1968.
-
(1968)
Ann. Math. Statist.
, vol.39
, Issue.3
, pp. 1030-1039
-
-
Robertson, T.1
Waltman, P.2
-
42
-
-
0000487650
-
Algorithms in order restricted statistical inference and the cauchy mean value property
-
Tim Robertson and F. T. Wright. Algorithms in order restricted statistical inference and the cauchy mean value property. Ann. Statist., 8(3):645-651, 1980.
-
(1980)
Ann. Statist.
, vol.8
, Issue.3
, pp. 645-651
-
-
Robertson, T.1
Wright, F.T.2
-
46
-
-
85161972679
-
Probabilistic inference and differential privacy
-
Oliver Williams and Frank McSherry. Probabilistic inference and differential privacy. In NIPS, 2010.
-
(2010)
NIPS
-
-
Williams, O.1
McSherry, F.2
-
47
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
Raymond Wong, Ada Fu, Ke Wang, and Jian Pei. Minimality attack in privacy preserving data publishing. In VLDB, 2007.
-
(2007)
VLDB
-
-
Wong, R.1
Fu, A.2
Wang, K.3
Pei, J.4
-
48
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
Xiaokui Xiao and Yufei Tao. Anatomy: Simple and effective privacy preservation. In VLDB, 2006.
-
(2006)
VLDB
-
-
Xiao, X.1
Tao, Y.2
-
49
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
Qing Zhang, Nick Koudas, Divesh Srivastava, and Ting Yu. Aggregate query answering on anonymized tables. In ICDE, 2007.
-
(2007)
ICDE
-
-
Zhang, Q.1
Koudas, N.2
Srivastava, D.3
Yu, T.4
|