-
3
-
-
80053477353
-
Secure personal data servers: A vision paper
-
Allard, T.; Anciaux, N.; Bouganim, L.; Guo, Y.; Le Folgoc, L.; Nguyen, B.; Pucheral, P.; Ray, I.; Ray, I.; Yin, S.: Secure personal data servers: a vision paper. Proc. VLDB Endow. 3, 25-35 (2010)
-
(2010)
Proc. VLDB Endow.
, vol.3
, pp. 25-35
-
-
Allard, T.1
Anciaux, N.2
Bouganim, L.3
Guo, Y.4
Le Folgoc, L.5
Nguyen, B.6
Pucheral, P.7
Ray, I.8
Ray, I.9
Yin, S.10
-
5
-
-
79956317161
-
Sanitizing microdata without leak: Combining preventive and curative actions
-
ISPEC'11 Springer Berlin 10.1007/978-3-642-21031-0-25
-
Allard, T.; Nguyen, B.; Pucheral, P.: Sanitizing microdata without leak: combining preventive and curative actions. In: Proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC'11, pp. 333-342. Springer, Berlin (2011)
-
(2011)
Proceedings of the 7th International Conference on Information Security Practice and Experience
, pp. 333-342
-
-
Allard, T.1
Nguyen, B.2
Pucheral, P.3
-
6
-
-
77954690725
-
Pluggable personal data servers
-
SIGMOD'10 ACM New York
-
Anciaux, N.; Bouganim, L.; Guo, Y.; Pucheral, P.; Vandewalle, J.-J.; Yin, S.: Pluggable personal data servers. In: Proceedings of the 2010 International Conference on Management of Data, SIGMOD'10, pp. 1235-1238. ACM, New York (2010)
-
(2010)
Proceedings of the 2010 International Conference on Management of Data
, pp. 1235-1238
-
-
Anciaux, N.1
Bouganim, L.2
Guo, Y.3
Pucheral, P.4
Vandewalle, J.-J.5
Yin, S.6
-
7
-
-
79959972183
-
Trusteddb: A trusted hardware based database with privacy and data confidentiality
-
SIGMOD'11 ACM New York 10.1145/1989323.1989346
-
Bajaj, S.; Sion, R.: Trusteddb: a trusted hardware based database with privacy and data confidentiality. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, SIGMOD'11, pp. 205-216. ACM, New York (2011)
-
(2011)
Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data
, pp. 205-216
-
-
Bajaj, S.1
Sion, R.2
-
9
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
PODS'05 ACM New York 10.1145/1065167.1065184
-
Blum, A.; Dwork, C.; McSherry, F.; Nissim, K.: Practical privacy: the SuLQ framework. In: Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS'05, pp. 128-138. ACM, New York (2005)
-
(2005)
Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
10
-
-
80052002672
-
Order-preserving encryption revisited: Improved security analysis and alternative solutions
-
CRYPTO'11 Springer Berlin
-
Boldyreva, A.; Chenette, N.; O'Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Proceedings of the 31st Annual Conference on Advances in Cryptology, CRYPTO'11, pp. 578-595. Springer, Berlin (2011)
-
(2011)
Proceedings of the 31st Annual Conference on Advances in Cryptology
, pp. 578-595
-
-
Boldyreva, A.1
Chenette, N.2
O'Neill, A.3
-
11
-
-
78751575843
-
SABRE: A Sensitive Attribute Bucketization and REdistribution framework for t-closeness
-
10.1007/s00778-010-0191-9
-
Cao, J.; Karras, P.; Kalnis, P.; Tan, K.-L.: SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness. VLDB J. 20, 59-81 (2011)
-
(2011)
VLDB J.
, vol.20
, pp. 59-81
-
-
Cao, J.1
Karras, P.2
Kalnis, P.3
Tan, K.-L.4
-
12
-
-
84860401382
-
Secure distributed data aggregation
-
10.1561/1900000025 1221.68042
-
Chan, H.; Hsiao, H.-C.; Perrig, A.; Song, D.: Secure distributed data aggregation. Found. Trends Databases 3(3), 149-201 (2011)
-
(2011)
Found. Trends Databases
, vol.3
, Issue.3
, pp. 149-201
-
-
Chan, H.1
Hsiao, H.-C.2
Perrig, A.3
Song, D.4
-
13
-
-
77954718437
-
Privacy-preserving data publishing
-
10.1561/1900000008
-
Chen, B.-C.; Kifer, D.; LeFevre, K.; Machanavajjhala, A.: Privacy-preserving data publishing. Found. Trends Databases 2(1-2), 1-167 (2009)
-
(2009)
Found. Trends Databases
, vol.2
, Issue.1-2
, pp. 1-167
-
-
Chen, B.-C.1
Kifer, D.2
Lefevre, K.3
Machanavajjhala, A.4
-
16
-
-
84900550421
-
-
Eurosmart: Smart USB token (white paper). Eurosmart (2008)
-
Eurosmart: Smart USB token (white paper). Eurosmart (2008)
-
-
-
-
17
-
-
79951794503
-
Secure set intersection with untrusted hardware tokens
-
CT-RSA'11 Springer Berlin 10.1007/978-3-642-19074-2-1
-
Fischlin, M.; Pinkas, B.; Sadeghi, A.-R.; Schneider, T.; Visconti, I.: Secure set intersection with untrusted hardware tokens. In: Proceedings of the 11th International Conference on Topics in Cryptology: CT-RSA 2011, CT-RSA'11, pp. 1-16. Springer, Berlin (2011)
-
(2011)
Proceedings of the 11th International Conference on Topics in Cryptology: CT-RSA 2011
, pp. 1-16
-
-
Fischlin, M.1
Pinkas, B.2
Sadeghi, A.-R.3
Schneider, T.4
Visconti, I.5
-
18
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
10.1145/1749603.1749605
-
Fung, B.C.M.; Wang, K.; Chen, R.; Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42, 14 (2010)
-
(2010)
ACM Comput. Surv.
, vol.42
, pp. 14
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
19
-
-
84988315609
-
Fast data anonymization with low information loss
-
VLDB'07 VLDB Endowment
-
Ghinita, G.; Karras, P.; Kalnis, P.; Mamoulis, N.: Fast data anonymization with low information loss. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB'07, pp. 758-769 (2007). VLDB Endowment
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
20
-
-
84883543273
-
-
Giesecke & Devrient Accessed 27 June 2012
-
Giesecke & Devrient. Portable security token. http://www.gd-sfs.com/ portable-security-token. Accessed 27 June 2012
-
Portable Security Token
-
-
-
21
-
-
33646562165
-
Foundations of cryptography: A primer
-
10.1561/0400000001 2379506
-
Goldreich, O.: Foundations of cryptography: a primer. Found. Trends Theor. Comput. Sci. 1(1), 1-116 (2005)
-
(2005)
Found. Trends Theor. Comput. Sci.
, vol.1
, Issue.1
, pp. 1-116
-
-
Goldreich, O.1
-
22
-
-
0023545076
-
How to play any mental game
-
STOC'87 ACM New York
-
Goldreich, O.; Micali, S.; Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, STOC'87, pp. 218-229. ACM, New York (1987)
-
(1987)
Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
24
-
-
77957013832
-
Interactive locking, zero-knowledge PCPs, and unconditional cryptography
-
T. Rabin (eds) Lecture Notes in Computer Science 6223 Springer Berlin 10.1007/978-3-642-14623-7-10
-
Goyal, V.; Ishai, Y.; Mahmoody, M.; Sahai, A.: Interactive locking, zero-knowledge PCPs, and unconditional cryptography. In: Rabin, T. (ed.) Advances in Cryptology - CRYPTO 2010. Lecture Notes in Computer Science, vol. 6223, pp. 173-190. Springer, Berlin (2010)
-
(2010)
Advances in Cryptology - CRYPTO 2010
, pp. 173-190
-
-
Goyal, V.1
Ishai, Y.2
Mahmoody, M.3
Sahai, A.4
-
25
-
-
77949605211
-
Founding cryptography on tamper-proof hardware tokens
-
D. Micciancio (eds) Lecture Notes in Computer Science 5978 Springer Berlin 10.1007/978-3-642-11799-2-19
-
Goyal, V.; Ishai, Y.; Sahai, A.; Venkatesan, R.; Wadia, A.: Founding cryptography on tamper-proof hardware tokens. In: Micciancio, D. (ed.) Theory of Cryptography. Lecture Notes in Computer Science, vol. 5978, pp. 308-326. Springer, Berlin (2010)
-
(2010)
Theory of Cryptography
, pp. 308-326
-
-
Goyal, V.1
Ishai, Y.2
Sahai, A.3
Venkatesan, R.4
Wadia, A.5
-
26
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
SIGMOD'02 ACM New York 10.1145/564691.564717
-
Hacigümüş, H.; Iyer, B.; Li, C.; Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD'02, pp. 216-227. ACM, New York (2002)
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigümüş, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
29
-
-
77955312868
-
Embedded SFE: Offloading server and network using hardware tokens
-
FC'10 Springer Berlin 10.1007/978-3-642-14577-3-17
-
Järvinen, K.; Kolesnikov, V.; Sadeghi, A.-R.; Schneider, T.: Embedded SFE: offloading server and network using hardware tokens. In: Proceedings of the 14th International Conference on Financial Cryptography and Data Security, FC'10, pp. 207-221. Springer, Berlin (2010)
-
(2010)
Proceedings of the 14th International Conference on Financial Cryptography and Data Security
, pp. 207-221
-
-
Järvinen, K.1
Kolesnikov, V.2
Sadeghi, A.-R.3
Schneider, T.4
-
30
-
-
36048997303
-
A secure distributed framework for achieving k-anonymity
-
10.1007/s00778-006-0008-z
-
Jiang, W.; Clifton, C.: A secure distributed framework for achieving k-anonymity. VLDB J. 15, 316-333 (2006)
-
(2006)
VLDB J.
, vol.15
, pp. 316-333
-
-
Jiang, W.1
Clifton, C.2
-
31
-
-
70350355055
-
Distributed anonymization: Achieving privacy for both data subjects and data providers
-
Springer Berlin
-
Jurczyk, P.; Xiong, L.: Distributed anonymization: achieving privacy for both data subjects and data providers. In: IFIP WG 11.3 Working Conference on Data and Applications Security, pp. 191-207. Springer, Berlin (2009)
-
(2009)
IFIP WG 11.3 Working Conference on Data and Applications Security
, pp. 191-207
-
-
Jurczyk, P.1
Xiong, L.2
-
32
-
-
38049150653
-
Universally composable multi-party computation using tamper-proof hardware
-
EUROCRYPT'07 Springer Berlin
-
Katz, J.: Universally composable multi-party computation using tamper-proof hardware. In: Proceedings of the 26th Annual International Conference on Advances in Cryptology, EUROCRYPT'07, pp. 115-128. Springer, Berlin (2007)
-
(2007)
Proceedings of the 26th Annual International Conference on Advances in Cryptology
, pp. 115-128
-
-
Katz, J.1
-
39
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
ICDE'06 IEEE Comput. Soc. Washington
-
Machanavajjhala, A.; Gehrke, J.; Kifer, D.; Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE'06, p. 24. IEEE Comput. Soc.; Washington (2006)
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
40
-
-
77952262067
-
Data publishing against realistic adversaries
-
Machanavajjhala, A.; Gehrke, J.; Götz, M.: Data publishing against realistic adversaries. Proc. VLDB Endow. 2(1), 790-801 (2009)
-
(2009)
Proc. VLDB Endow.
, vol.2
, Issue.1
, pp. 790-801
-
-
Machanavajjhala, A.1
Gehrke, J.2
Götz, M.3
-
42
-
-
70349096680
-
Privacy-preserving data mashup
-
EDBT'09 ACM New York 10.1145/1516360.1516388
-
Mohammed, N.; Fung, B.C.M.; Wang, K.; Hung, P.C.K.: Privacy-preserving data mashup. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, EDBT'09, pp. 228-239. ACM, New York (2009)
-
(2009)
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
, pp. 228-239
-
-
Mohammed, N.1
Fung, B.C.M.2
Wang, K.3
Hung, P.C.K.4
-
43
-
-
78149335185
-
Centralized and distributed anonymization for high-dimensional healthcare data
-
18 10.1145/1857947.1857950
-
Mohammed, N.; Fung, B.C.M.; Hung, P.C.K.; Lee, C.-K.: Centralized and distributed anonymization for high-dimensional healthcare data. ACM Trans. Knowl. Discov. Data 4, 18 (2010)
-
(2010)
ACM Trans. Knowl. Discov. Data
, vol.4
-
-
Mohammed, N.1
Fung, B.C.M.2
Hung, P.C.K.3
Lee, C.-K.4
-
44
-
-
80052663001
-
Differentially private data release for data mining
-
KDD'11 ACM New York
-
Mohammed, N.; Chen, R.; Fung, B.C.; Yu, P.S.: Differentially private data release for data mining. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'11, pp. 493-501. ACM, New York (2011)
-
(2011)
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 493-501
-
-
Mohammed, N.1
Chen, R.2
Fung, B.C.3
Yu, P.S.4
-
46
-
-
84900537639
-
The boundary between privacy and utility in data anonymization
-
arXiv:cs/0612103
-
Rastogi, V.; Suciu, D.; Hong, S.: The boundary between privacy and utility in data anonymization. CoRR (2006). arXiv:cs/0612103
-
(2006)
CoRR
-
-
Rastogi, V.1
Suciu, D.2
Hong, S.3
-
48
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
10.1142/S0218488502001648 1085.68589 1948199
-
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557-570 (2002)
-
(2002)
Int. J. Uncertain. Fuzziness Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
50
-
-
79955104712
-
Distributed privacy preserving data collection
-
DASFAA'11 Springer Berlin
-
Xue, M.; Papadimitriou, P.; Raïssi, C.; Kalnis, P.; Pung, H.K.: Distributed privacy preserving data collection. In: Proceedings of the 16th International Conference on Database Systems for Advanced Applications - Volume Part I, DASFAA'11, pp. 93-107. Springer, Berlin (2011)
-
(2011)
Proceedings of the 16th International Conference on Database Systems for Advanced Applications - Volume Part i
, pp. 93-107
-
-
Xue, M.1
Papadimitriou, P.2
Raïssi, C.3
Kalnis, P.4
Pung, H.K.5
-
53
-
-
33244463520
-
Privacy-enhancing k-anonymization of customer data
-
PODS'05 ACM New York 10.1145/1065167.1065185
-
Zhong, S.; Yang, Z.; Wright, R.N.: Privacy-enhancing k-anonymization of customer data. In: Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS'05, pp. 139-147. ACM, New York (2005)
-
(2005)
Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 139-147
-
-
Zhong, S.1
Yang, Z.2
Wright, R.N.3
-
54
-
-
67549084348
-
K-anonymous data collection
-
10.1016/j.ins.2009.05.004 1193.68106 2547763
-
Zhong, S.; Yang, Z.; Chen, T.: k-anonymous data collection. Inf. Sci. 179, 2948-2963 (2009)
-
(2009)
Inf. Sci.
, vol.179
, pp. 2948-2963
-
-
Zhong, S.1
Yang, Z.2
Chen, T.3
|