-
1
-
-
19944380112
-
Database security-concepts, approaches, and challenges
-
Jan.-Mar.
-
E. Bertino and R. Sandhu, "Database Security-Concepts, Approaches, and Challenges," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 2-19, Jan.-Mar. 2005.
-
(2005)
IEEE Trans. Dependable and Secure Computing
, vol.2
, Issue.1
, pp. 2-19
-
-
Bertino, E.1
Sandhu, R.2
-
2
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov. 2001. (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
3
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
article 14
-
B. Fung, K. Wang, R. Chen, and P. Yu, "Privacy-Preserving Data Publishing: A Survey of Recent Developments," ACM Computing Surveys, vol. 42, no. 4, article 14, 2010.
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.4
-
4
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
article 3
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-Diversity: Privacy Beyond k-anonymity," ACM Trans. Knowledge Discovery from Data, vol. 1, no. 1, article 3, 2007.
-
(2007)
ACM Trans. Knowledge Discovery from Data
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
5
-
-
51149098991
-
Workload-aware anonymization techniques for large-scale datasets
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan, "Workload-Aware Anonymization Techniques for Large-Scale Datasets," ACM Trans. Database Systems, vol. 33, no. 3, pp. 1-47, 2008.
-
(2008)
ACM Trans. Database Systems
, vol.33
, Issue.3
, pp. 1-47
-
-
Lefevre, K.1
Dewitt, D.2
Ramakrishnan, R.3
-
6
-
-
85011028519
-
K-anonymization as spatial indexing: Toward scalable and incremental anonymization
-
T. Iwuchukwu and J. Naughton, "K-Anonymization as Spatial Indexing: Toward Scalable and Incremental Anonymization," Proc. 33rd Int'l Conf. Very Large Data Bases, pp. 746-757, 2007.
-
(2007)
Proc. 33rd Int'l Conf. Very Large Data Bases
, pp. 746-757
-
-
Iwuchukwu, T.1
Naughton, J.2
-
7
-
-
67949087792
-
Syndromic surveillance practice in the united states: Findings from a survey of state, territorial, and selected local health departments
-
J. Buehler, A. Sonricker, M. Paladini, P. Soper, and F. Mostashari, "Syndromic Surveillance Practice in the United States: Findings from a Survey of State, Territorial, and Selected Local Health Departments," Advances in Disease Surveillance, vol. 6, no. 3, pp. 1-20, 2008.
-
(2008)
Advances in Disease Surveillance
, vol.6
, Issue.3
, pp. 1-20
-
-
Buehler, J.1
Sonricker, A.2
Paladini, M.3
Soper, P.4
Mostashari, F.5
-
9
-
-
70849096218
-
Implementing row-and cell-level security in classified databases using sql server 2005
-
A. Rask, D. Rubin, and B. Neumann, "Implementing Row-and Cell-Level Security in Classified Databases Using SQL Server 2005," MS SQL Server Technical Center, 2005.
-
(2005)
MS SQL Server Technical Center
-
-
Rask, A.1
Rubin, D.2
Neumann, B.3
-
10
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy, "Extending Query Rewriting Techniques for Fine-Grained Access Control," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 551-562, 2004.
-
(2004)
Proc. ACM SIGMOD Int'l Conf. Management of Data
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
11
-
-
34548810781
-
Fine grained authorization through predicated grants
-
DOI 10.1109/ICDE.2007.368976, 4221766, 23rd International Conference on Data Engineering, ICDE 2007
-
S. Chaudhuri, T. Dutta, and S. Sudarshan, "Fine Grained Authorization through Predicated Grants," Proc. IEEE 23rd Int'l Conf. Data Eng., pp. 1174-1183, 2007. (Pubitemid 47422121)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 1174-1183
-
-
Chaudhuri, S.1
Dutta, T.2
Sudarshan, S.3
-
12
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D. DeWitt, "Limiting Disclosure in Hippocratic Databases," Proc. 30th Int'l Conf. Very Large Data Bases, pp. 108-119, 2004.
-
(2004)
Proc. 30th Int'l Conf. Very Large Data Bases
, pp. 108-119
-
-
Lefevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
Dewitt, D.6
-
13
-
-
84992227458
-
Proposed nist standard for role-based access control
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli, "Proposed NIST Standard for Role-Based Access Control," ACM Trans. Information and System Security, vol. 4, no. 3, pp. 224-274, 2001.
-
(2001)
ACM Trans. Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
14
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan, "Mondrian Multidimensional K-Anonymity," Proc. 22nd Int'l Conf. Data Eng., pp. 25-25, 2006.
-
(2006)
Proc. 22nd Int'l Conf. Data Eng.
, pp. 25-25
-
-
Lefevre, K.1
Dewitt, D.2
Ramakrishnan, R.3
-
15
-
-
84945709355
-
An algorithm for finding best matches in logarithmic expected time
-
J. Friedman, J. Bentley, and R. Finkel, "An Algorithm for Finding Best Matches in Logarithmic Expected Time," ACM Trans. Mathematical Software, vol. 3, no. 3, pp. 209-226, 1977.
-
(1977)
ACM Trans. Mathematical Software
, vol.3
, Issue.3
, pp. 209-226
-
-
Friedman, J.1
Bentley, J.2
Finkel, R.3
-
17
-
-
33746711412
-
Approximation algorithms for k-anonymity
-
2005112001
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu, "Approximation Algorithms for k-Anonymity," J. Privacy Technology, vol. 2005112001, pp. 1-18, 2005.
-
(2005)
J. Privacy Technology
, pp. 1-18
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
19
-
-
79959679120
-
Optimal chunking of large multidimensional arrays for data warehousing
-
E. Otoo, D. Rotem, and S. Seshadri, "Optimal Chunking of Large Multidimensional Arrays for Data Warehousing," Proc. ACM 10th Int'l Workshop on Data Warehousing and OLAP, pp. 25-32, 2007.
-
(2007)
Proc. ACM 10th Int'l Workshop on Data Warehousing and OLAP
, pp. 25-32
-
-
Otoo, E.1
Rotem, D.2
Seshadri, S.3
-
20
-
-
0001069505
-
On the distribution of the number of successes in independent trials
-
W. Hoeffding, "On the Distribution of the Number of Successes in Independent Trials," The Annals of Math. Statistics, vol. 27, no. 3, pp. 713-721, 1956.
-
(1956)
The Annals of Math. Statistics
, vol.27
, Issue.3
, pp. 713-721
-
-
Hoeffding, W.1
-
22
-
-
77955704565
-
-
B. Steven, A. Trent, G. Katie, G. Ronald, B. S. Matthew, andM. Sobek, "Integrated Public Use Microdata Series: Version 5. 0 [Machine-Readable Database]," https://usa. ipums. org/usa/, 2010.
-
(2010)
Integrated Public Use Microdata Series: Version 5. 0 [Machine-Readable Database]
-
-
Steven, B.1
Trent, A.2
Katie, G.3
Ronald, G.4
Matthew, B.S.5
Sobek, M.6
-
23
-
-
28444446666
-
Extending relational database systems to automatically enforce privacy policies
-
R. Agrawal, P. Bird, T. Grandison, J. Kiernan, S. Logan, and W. Rjaibi, "Extending Relational Database Systems to Automatically Enforce Privacy Policies," Proc. 21st Int'l Conf. Data Eng., pp. 1013-1022, 2005.
-
(2005)
Proc. 21st Int'l Conf. Data Eng.
, pp. 1013-1022
-
-
Agrawal, R.1
Bird, P.2
Grandison, T.3
Kiernan, J.4
Logan, S.5
Rjaibi, W.6
-
25
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork, "Differential Privacy," Proc. 33rd Int'l Colloquium Automata, Languages and Programming, pp. 1-12, 2006. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
26
-
-
84897443908
-
-
Arxiv preprint arXiv: 1101. 2604, 2011
-
N. Li, W. Qardaji, and D. Su, "Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy," Arxiv preprint arXiv:1101. 2604, 2011.
-
Provably Private Data Anonymization: Or, K-Anonymity Meets Differential Privacy
-
-
Li, N.1
Qardaji, W.2
Su, D.3
-
27
-
-
84988315609
-
Fast data anonymization with low information loss
-
G. Ghinita, P. Karras, P. Kalnis, and N. Mamoulis, "Fast Data Anonymization with Low Information Loss," Proc. 33rd Int'l Conf. Very Large Data Bases, pp. 758-769, 2007.
-
(2007)
Proc. 33rd Int'l Conf. Very Large Data Bases
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
28
-
-
68649129111
-
A framework for efficient data anonymization under privacy and accuracy constraints
-
article 9
-
G. Ghinita, P. Karras, P. Kalnis, and N. Mamoulis, "A Framework for Efficient Data Anonymization Under Privacy and Accuracy Constraints," ACM Trans. Database Systems, vol. 34, no. 2, article 9, 2009.
-
(2009)
ACM Trans. Database Systems
, vol.34
, Issue.2
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
29
-
-
79959998772
-
Ireduct: Differential privacy with reduced relative errors
-
X. Xiao, G. Bender, M. Hay, and J. Gehrke, "Ireduct: Differential Privacy with Reduced Relative Errors," Proc. ACM SIGMOD Int'l Conf. Management of Data, 2011.
-
(2011)
Proc. ACM SIGMOD Int'l Conf. Management of Data
-
-
Xiao, X.1
Bender, G.2
Hay, M.3
Gehrke, J.4
|