-
2
-
-
84872247674
-
Dynamic policy adaptation for inference control of queries to a propositional information system
-
Biskup, J.: Dynamic policy adaptation for inference control of queries to a propositional information system. JCS 20(5), 509-546 (2012)
-
(2012)
JCS
, vol.20
, Issue.5
, pp. 509-546
-
-
Biskup, J.1
-
3
-
-
77954475442
-
Towards publishing recommendation data with predictive anonymization
-
Chang, C., Thompson, B., Wang, H., Yao, D.: Towards publishing recommendation data with predictive anonymization. In: Proc. of ASIACCS 2010, Beijing, China (April 2010)
-
Proc. of ASIACCS 2010, Beijing, China (April 2010)
-
-
Chang, C.1
Thompson, B.2
Wang, H.3
Yao, D.4
-
4
-
-
77955210832
-
Combining fragmentation and encryption to protect privacy in data storage
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 13(3), 22:1-22:33 (2010)
-
(2010)
ACM TISSEC
, vol.13
, Issue.3
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
5
-
-
79959237939
-
Selective data outsourcing for enforcing privacy
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Selective data outsourcing for enforcing privacy. JCS 19(3), 531-566 (2011)
-
(2011)
JCS
, vol.19
, Issue.3
, pp. 531-566
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
6
-
-
78149348689
-
k-Anonymous data mining: A survey
-
Aggarwal, C., Yu, P. (eds.) Springer
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-Anonymous data mining: A survey. In: Aggarwal, C., Yu, P. (eds.) Privacy-Preserving Data Mining: Models and Algorithms. Springer (2008)
-
(2008)
Privacy-Preserving Data Mining: Models and Algorithms
-
-
Ciriani, V.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
7
-
-
72749109110
-
Anonymizing bipartite graph data using safe groupings
-
Cormode, G., Srivastava, D., Yu, T., Zhang, Q.: Anonymizing bipartite graph data using safe groupings. PVLDB 1(1), 833-844 (2008)
-
(2008)
PVLDB
, vol.1
, Issue.1
, pp. 833-844
-
-
Cormode, G.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
8
-
-
84864356094
-
Enforcing subscription-based authorization policies in cloud scenarios
-
Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. Springer, Heidelberg
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G.: Enforcing subscription-based authorization policies in cloud scenarios. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 314-329. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7371
, pp. 314-329
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Livraga, G.4
-
9
-
-
79958034128
-
Fragments and loose associations: Respecting privacy in data publishing
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. PVLDB 3(1), 1370-1381 (2010)
-
(2010)
PVLDB
, vol.3
, Issue.1
, pp. 1370-1381
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
84857751287
-
Protecting privacy in data release
-
Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. Springer, Heidelberg
-
De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Protecting privacy in data release. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. LNCS, vol. 6858, pp. 1-34. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6858
, pp. 1-34
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Livraga, G.3
Samarati, P.4
-
11
-
-
33746335051
-
Differential privacy
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
-
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
12
-
-
84874048096
-
Supporting security requirements for resource management in cloud computing
-
Jhawar, R., Piuri, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. In: Proc. of CSE 2012, Paphos, Cyprus (December 2012)
-
Proc. of CSE 2012, Paphos, Cyprus (December 2012)
-
-
Jhawar, R.1
Piuri, V.2
Samarati, P.3
-
13
-
-
34250673244
-
Injecting utility into anonymized datasets
-
Kifer, D., Gehrke, J.: Injecting utility into anonymized datasets. In: Proc. of SIGMOD 2006, Chicago, IL, USA (June 2006)
-
Proc. of SIGMOD 2006, Chicago, IL, USA (June 2006)
-
-
Kifer, D.1
Gehrke, J.2
-
14
-
-
34548805858
-
t-closeness: Privacy beyond k-anonymity and ℓ-diversity
-
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and ℓ-diversity. In: Proc. of ICDE 2007, Istanbul, Turkey (April 2007)
-
Proc. of ICDE 2007, Istanbul, Turkey (April 2007)
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
15
-
-
34248181923
-
ℓ-Diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: ℓ-Diversity: Privacy beyond k-anonymity. ACM TKDD 1(1), 3:1-3:52 (2007)
-
(2007)
ACM TKDD
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
16
-
-
79956304773
-
Privacy-preserving network aggregation
-
Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) PAKDD 2010, Part I. Springer, Heidelberg
-
Raeder, T., Blanton, M., Chawla, N.V., Frikken, K.: Privacy-preserving network aggregation. In: Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) PAKDD 2010, Part I. LNCS, vol. 6118, pp. 198-207. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6118
, pp. 198-207
-
-
Raeder, T.1
Blanton, M.2
Chawla, N.V.3
Frikken, K.4
-
17
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P.: Protecting respondents' identities in microdata release. IEEE TKDE 13(6), 1010-1027 (2001)
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
18
-
-
77952768140
-
Correlation hiding by independence masking
-
Tao, Y., Pei, J., Li, J., Xiao, X., Yi, K., Xing, Z.: Correlation hiding by independence masking. In: Proc. of ICDE 2010, Long Beach, CA, USA (March 2010)
-
Proc. of ICDE 2010, Long Beach, CA, USA (March 2010)
-
-
Tao, Y.1
Pei, J.2
Li, J.3
Xiao, X.4
Yi, K.5
Xing, Z.6
-
19
-
-
84873108658
-
Privacy preservation by disassociation
-
Terrovitis, M., Mamoulis, N., Liagouris, J., Skiadopoulos, S.: Privacy preservation by disassociation. PVLDB 5(10), 944-955 (2012)
-
(2012)
PVLDB
, vol.5
, Issue.10
, pp. 944-955
-
-
Terrovitis, M.1
Mamoulis, N.2
Liagouris, J.3
Skiadopoulos, S.4
-
20
-
-
33749581232
-
Anonymizing sequential releases
-
Wang, K., Fung, B.: Anonymizing sequential releases. In: Proc. of KDD 2006, Philadelphia, PA, USA (August 2006)
-
Proc. of KDD 2006, Philadelphia, PA, USA (August 2006)
-
-
Wang, K.1
Fung, B.2
|