-
1
-
-
3242812017
-
Privacy in electronic commerce and the economics of immediate gratification
-
New York, May, New York, NY, New York, NY: ACM Press
-
Acquisti, A. Privacy in electronic commerce and the economics of immediate gratification. Proceedings of ACM electronic commerce conference, New York. May 17-20 2004. pp. 21-29. New York, NY: ACM Press.
-
(2004)
Proceedings of ACM electronic commerce conference
, pp. 21-29
-
-
Acquisti, A.1
-
3
-
-
34250661905
-
Achieving anonymity via clustering
-
June, Chicago, IL. New York, NY: ACM Press
-
Aggarwal, G. Achieving anonymity via clustering. Proceedings of ACM PODS. June 26-28 2006. pp. 153-162. Chicago, IL. New York, NY: ACM Press
-
(2006)
Proceedings of ACM PODS
, pp. 153-162
-
-
Aggarwal, G.1
-
4
-
-
0038250644
-
-
VLDB, September 1994, Santiago de Chile, Chile. Morgan Kaufmann Publishers
-
Agrawal, R. and Srikant, R. Fast algorithms for mining association rules in large databases. VLDB. pp. 12-15 September 1994, Santiago de Chile, Chile. Morgan Kaufmann Publishers, 487-499.
-
Fast algorithms for mining association rules in large databases
, pp. 12-15
-
-
Agrawal, R.1
Srikant, R.2
-
6
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
ICDE, April, Tokyo, Japan, Tokyo: IEEE Computer Society
-
Bayardo, R. and Agrawal, R. Data privacy through optimal k-anonymization. ICDE. April 5-8 2005. pp. 217-228. Tokyo, Japan: IEEE Computer Society.
-
(2005)
, pp. 217-228
-
-
Bayardo, R.1
Agrawal, R.2
-
7
-
-
77951201056
-
Privacy-preserving data publishing: a survey on recent developments
-
Benjamin Fung, C.M. 2010. Privacy-preserving data publishing: a survey on recent developments. ACM Computing Surveys, 42 (4): 1-53
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
, pp. 1-53
-
-
Benjamin Fung, C.M.1
-
8
-
-
33947186222
-
Investigating the relationship between internet privacy concerns and online purchase behavior
-
Brown, M. and Muchira, R. 2004. Investigating the relationship between internet privacy concerns and online purchase behavior. Journal of Electronic Commerce Research, 5 (1): 62-70.
-
(2004)
Journal of Electronic Commerce Research
, vol.5
, Issue.1
, pp. 62-70
-
-
Brown, M.1
Muchira, R.2
-
10
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D. 1981. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24 (2): 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
11
-
-
77954718437
-
Privacy-preserving data publishing
-
Chen, B.-C. 2009. Privacy-preserving data publishing. Foundations and Trends® in Databases, 2 (1-2): 1-167.
-
(2009)
Foundations and Trends® in Databases
, vol.2
, Issue.1-2
, pp. 1-167
-
-
Chen, B.-C.1
-
14
-
-
35048856104
-
Privacy-preserving data mining on vertically partitioned databases
-
August, Santa Barbara, CA, Santa Barbara: Springer
-
Dwork, C. and Nissim, K. Privacy-preserving data mining on vertically partitioned databases. Advances in cryptology: proceedings of crypto. August 15-19 2004. pp. 528-544. Santa Barbara, CA: Springer.
-
(2004)
Advances in cryptology: Proceedings of crypto
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
15
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
June, San Diego, CA, San Diego: ACM Press
-
Evfimievski, A., Gehrke, J. and Srikant, R. Limiting privacy breaches in privacy preserving data mining. Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems. June 9-12 2003. pp. 211-222. San Diego, CA: ACM Press.
-
(2003)
Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
16
-
-
33244482849
-
Models and methods for privacy-preserving data publishing and analysis
-
20-23 August, Philadelphia, PA. ACM Press, 20-23 August 2006, Philadelphia
-
Gehrke, J. Models and methods for privacy-preserving data publishing and analysis. Tutorial at the 12th ACM SIGKDD. 20-23 August 2006, Philadelphia, PA. ACM Press
-
(2006)
Tutorial at the 12th ACM SIGKDD
-
-
Gehrke, J.1
-
17
-
-
84988315609
-
Fast data anonymization with low information loss
-
September, Austria: ACM Press, University of Vienna
-
Ghinita, G. Fast data anonymization with low information loss. Proceedings of VLDB. September 23-27 2007. pp. 758-769. Austria: ACM Press. University of Vienna
-
(2007)
Proceedings of VLDB
, pp. 758-769
-
-
Ghinita, G.1
-
19
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
July, Edmonton, Alberta, Canada, Edmonton, Alberta: ACM Press
-
Iyengar, V. Transforming data to satisfy privacy constraints. Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining. July 23-26 2002. pp. 279-288. Edmonton, Alberta, Canada: ACM Press.
-
(2002)
Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining
, pp. 279-288
-
-
Iyengar, V.1
-
20
-
-
85084162002
-
Making mix nets robust for electronic voting by randomized partial checking
-
August, San Francisco, CA, USA, San Francisco, CA, USENIX Association Berkeley, CA
-
Jakobsson, M., Juels, A. and Rivest, R.L. Making mix nets robust for electronic voting by randomized partial checking. Proceedings of the 11th USENIX security symposium. August 5-9 2002. pp. 339-353. San Francisco, CA, USA USENIX Association Berkeley, CA
-
(2002)
Proceedings of the 11th USENIX security symposium
, pp. 339-353
-
-
Jakobsson, M.1
Juels, A.2
Rivest, R.L.3
-
21
-
-
84859557518
-
A practical approximation algorithm for optimal k-anonymity
-
doi: 10.1007/s 10618-011-0235-9
-
Kenig, B. and Tassa, T. 2012. A practical approximation algorithm for optimal k-anonymity. Data Mining and Knowledge Discovery, 25, 134-168 doi: 10.1007/s 10618-011-0235-9
-
(2012)
Data Mining and Knowledge Discovery
, vol.25
, pp. 134-168
-
-
Kenig, B.1
Tassa, T.2
-
22
-
-
33244455692
-
Simulatable auditing
-
June, Baltimore, Maryland, Baltimore: ACM Press
-
Kenthapadi, K., Mishra, N. and Nissim, K. Simulatable auditing. Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems. June 13-16 2005. pp. 118-127. Baltimore, Maryland: ACM Press.
-
(2005)
Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems
, pp. 118-127
-
-
Kenthapadi, K.1
Mishra, N.2
Nissim, K.3
-
23
-
-
0037929598
-
Auditing boolean attributes
-
Kleinberg, J., Papadimitriou, C. and Raghavan, P. 2003. Auditing boolean attributes. Journal of Computer and System Sciences, 6: 244-253.
-
(2003)
Journal of Computer and System Sciences
, vol.6
, pp. 244-253
-
-
Kleinberg, J.1
Papadimitriou, C.2
Raghavan, P.3
-
24
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
ICDE, April, The Marmara Hotel, Istanbul, Turkey, The Marmara Hotel, Istanbul: IEEE Computer Society
-
Koudas, N. Aggregate query answering on anonymized tables. ICDE. April 15-20 2007. pp. 116-125. The Marmara Hotel, Istanbul, Turkey: IEEE Computer Society.
-
(2007)
, pp. 116-125
-
-
Koudas, N.1
-
25
-
-
29844444250
-
Incognito: efficient full-domain k-anonymity
-
June, Baltimore, Maryland, Baltimore: ACM Press
-
Lefevre, K., Dewitt, D.J. and Ramakrishnan, R. Incognito: efficient full-domain k-anonymity. Proceedings of ACM SIGMOD. June 14-16 2005. pp. 49-60. Baltimore, Maryland: ACM Press.
-
(2005)
Proceedings of ACM SIGMOD
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
26
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
April, Atlanta, GA, Atlanta: IEEE Computer Society
-
Lefevre, K., Dewitt, D.J. and Ramakrishnan, R. Mondrian multidimensional k-anonymity. Proceedings of the 22nd IEEE international conference on data engineering (ICDE). April 3-8 2006. pp. 25-34. Atlanta, GA: IEEE Computer Society.
-
(2006)
Proceedings of the 22nd IEEE international conference on data engineering (ICDE)
, pp. 25-34
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
27
-
-
33749568323
-
Workload-aware anonymization
-
KDD, August, Philadelphia, CA, Philadelphia: ACM
-
Lefevre, K., Dewitt, D.J. and Ramakrishnan, R. Workload-aware anonymization. KDD. August 20-23 2006. pp. 277-286. Philadelphia, CA: ACM.
-
(2006)
, pp. 277-286
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
28
-
-
34548805858
-
t-Closeness: privacy beyond k-anonymity and l-diversity
-
April, The Marmara Hotel, Istanbul, Turkey, The Marmara Hotel, Istanbul: IEEE Computer Society
-
Li, N., Li, T. and Venkatasubramanian, S. t-Closeness: privacy beyond k-anonymity and l-diversity. Proceedings of ICDE. April 15-20 2007. pp. 106-115. The Marmara Hotel, Istanbul, Turkey: IEEE Computer Society.
-
(2007)
Proceedings of ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
29
-
-
63749102777
-
An efficient clustering method for k-anonymization
-
29 March 2008, Nantes, France. IOS Press
-
Lin, J.L. and Wei, M.C. An efficient clustering method for k-anonymization. Proceedings of PAIS, 29 March 2008, Nantes, France. IOS Press, 46-50.
-
Proceedings of PAIS
, pp. 46-50
-
-
Lin, J.L.1
Wei, M.C.2
-
30
-
-
35248900307
-
Capturing data usefulness and privacy protection in k-anonymisation
-
Convention Center Seoul, March, Korea: ACM Press
-
Loukides, G. and Shao, J. Capturing data usefulness and privacy protection in k-anonymisation. Proceedings of the 2007 ACM symposium on applied computing, Convention Center Seoul. March 11-15 2007. pp. 370-374. Korea: ACM Press.
-
(2007)
Proceedings of the 2007 ACM symposium on applied computing
, pp. 370-374
-
-
Loukides, G.1
Shao, J.2
-
31
-
-
38149078956
-
Speeding up clustering-based k-anonymisation algorithms with pre-partitioning
-
BNCOD, July, Glasgow, UK, Glasgow: Springer
-
Loukides, G. and Shao, J. Speeding up clustering-based k-anonymisation algorithms with pre-partitioning. BNCOD. July 3-5 2007. pp. 203-214. Glasgow, UK: Springer.
-
(2007)
, pp. 203-214
-
-
Loukides, G.1
Shao, J.2
-
32
-
-
33749607006
-
l-diversity: privacy beyond k-anonymity
-
3-7 April 2006, Atlanta, GA. IEEE Press
-
Machanavajjhala, A. l-diversity: privacy beyond k-anonymity. Proceedings of ICDE, 3-7 April 2006, Atlanta, GA. IEEE Press, 24-24.
-
Proceedings of ICDE
, pp. 24
-
-
Machanavajjhala, A.1
-
33
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
June, Paris, France, Paris: ACM Press
-
Meyerson, A. and Williams, R. On the complexity of optimal k-anonymity. Proceedings of ACM PODS. June 13-18 2004. pp. 223-228. Paris, France: ACM Press.
-
(2004)
Proceedings of ACM PODS
, pp. 223-228
-
-
Meyerson, A.1
Williams, R.2
-
34
-
-
0035049112
-
Analysis of the clustering properties of the Hilbert space-filling curve
-
Moon, B., Jagadish, H. and Faloutsos, C. 2001. Analysis of the clustering properties of the Hilbert space-filling curve. IEEE TKDE, 13 (1): 124-141.
-
(2001)
IEEE TKDE
, vol.13
, Issue.1
, pp. 124-141
-
-
Moon, B.1
Jagadish, H.2
Faloutsos, C.3
-
35
-
-
35448962139
-
Approximate algorithms for k-anonymity
-
Beijing, China, Beijing: ACM Press
-
Park, H. and Shim, K. Approximate algorithms for k-anonymity. Proceedings of the SIGMOD. 12-14 2007. pp. 67-78. Beijing, China: ACM Press.
-
(2007)
Proceedings of the SIGMOD
, pp. 67-78
-
-
Park, H.1
Shim, K.2
-
36
-
-
77955553620
-
Approximate algorithms with generalizing attribute values for k-anonymity
-
Park, H. and Shim, K. 2010. Approximate algorithms with generalizing attribute values for k-anonymity. Information System, 35: 933-955.
-
(2010)
Information System
, vol.35
, pp. 933-955
-
-
Park, H.1
Shim, K.2
-
37
-
-
0002008071
-
Discovering frequent closed itemsets for association rules
-
ICDT, January, Jerusalem, Israel, Jerusalem: Springer
-
Pasquier, N. Discovering frequent closed itemsets for association rules. ICDT. January 10-12 1999. pp. 398-416. Jerusalem, Israel: Springer.
-
(1999)
, pp. 398-416
-
-
Pasquier, N.1
-
38
-
-
60449089117
-
-
Privacy & American Business (P&AB), Conducted by Harris Interactive, May 2005. Available from: [Accessed 18 June 2011]
-
Privacy & American Business (P&AB). 2005. New survey reports an increase in ID theft and decrease in consumer confidence [online] Conducted by Harris Interactive, May 2005. Available from: http://www.pandab.org/deloitteidsurveypr.html [Accessed 18 June 2011]
-
(2005)
New survey reports an increase in ID theft and decrease in consumer confidence [online]
-
-
-
42
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Sweeney, L. 2002b. Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems, 10 (5): 571-588.
-
(2002)
International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
43
-
-
0003430416
-
-
Amsterdam, Amsterdam: Sentient Machine Research, Available from: [Accessed 20 June 2011]
-
van der Putten, P. and van Someren, M. 2000. CoIL challenge 2000: the insurance company case [online], Amsterdam: Sentient Machine Research. Available from: http://archive.ics.uci.edu/ml/datasets/Insurance+Company+Benchmark+%28COIL+2000%29 [Accessed 20 June 2011]
-
(2000)
CoIL challenge 2000: The insurance company case [online]
-
-
van der Putten, P.1
van Someren, M.2
-
44
-
-
0013776710
-
Randomized response: a survey technique for eliminating evasive answer bias
-
Warner, S.L. 1965. Randomized response: a survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60 (309): 63-69.
-
(1965)
Journal of the American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
45
-
-
33749571958
-
(α, k)-anonymity: an enhanced k-anonymity model for privacy-preserving data publishing
-
August, Philadelphia, PA, New York, Philadelphia, PA: ACM Press
-
Wong, R.C.W. (α, k)-anonymity: an enhanced k-anonymity model for privacy-preserving data publishing. Proceedings of the ACM KDD. August 20-23 2006. pp. 754-759. Philadelphia, PA, New York: ACM Press.
-
(2006)
Proceedings of the ACM KDD
, pp. 754-759
-
-
Wong, R.C.W.1
-
46
-
-
34250680246
-
Personalized privacy preservation
-
June, Chicago, IL, Chicago: ACM Press
-
Xiao, X. and Tao, Y. Personalized privacy preservation. Proceedings of ACM SIGMOD. June 27-29 2006. pp. 229-240. Chicago, IL: ACM Press.
-
(2006)
Proceedings of ACM SIGMOD
, pp. 229-240
-
-
Xiao, X.1
Tao, Y.2
-
47
-
-
33749582207
-
Utility-based anonymization using local recoding
-
August, Philadelphia, PA, Philadelphia: ACM Press
-
Xu, J. Utility-based anonymization using local recoding. Proceedings of SIGKDD. August 20-23 2006. pp. 785-790. Philadelphia, PA: ACM Press.
-
(2006)
Proceedings of SIGKDD
, pp. 785-790
-
-
Xu, J.1
-
48
-
-
32344451483
-
Anonymity-preserving data collection
-
August, Chicago, IL, Chicago: ACM Press
-
Yang, Z., Zhong, S. and Wright, R.N. Anonymity-preserving data collection. Proceedings of the 11th ACM SIGKDD. August 21-25 2005. pp. 334-343. Chicago, IL: ACM Press.
-
(2005)
Proceedings of the 11th ACM SIGKDD
, pp. 334-343
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
49
-
-
33745214431
-
Generalized multidimensional data mapping and query processing
-
Zhang, R. 2005. Generalized multidimensional data mapping and query processing. ACM TODS, 30 (3): 661-697.
-
(2005)
ACM TODS
, vol.30
, Issue.3
, pp. 661-697
-
-
Zhang, R.1
|