-
1
-
-
0024914229
-
Security-control methods for statistical databases: a comparative study
-
Adam N.R., Wortmann J.C. Security-control methods for statistical databases: a comparative study. ACM Comput Surv 1989, 21(4):515-556.
-
(1989)
ACM Comput Surv
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
2
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
Agrawal D, Aggarwal CC. On the design and quantification of privacy preserving data mining algorithms. In: ACM PODS; 2001. p. 247-55.
-
(2001)
ACM PODS
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
3
-
-
0041783510
-
Privacy-preserving data mining
-
ACM Press
-
Agrawal R., Srikant R. Privacy-preserving data mining. SIGMOD 2000, 439-450. ACM Press.
-
(2000)
SIGMOD
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
5
-
-
84859221764
-
Small domain randomization: same privacy, more utility
-
Chaytor R, Wang K. Small domain randomization: same privacy, more utility. In: VLDB; 2010. p. 608-18.
-
(2010)
VLDB
, pp. 608-618
-
-
Chaytor, R.1
Wang, K.2
-
6
-
-
84881650268
-
On syntactic anonymity and differential privacy
-
Clifton C., Tassa T. On syntactic anonymity and differential privacy. Trans Data Privacy 2013, 6(2):161-183.
-
(2013)
Trans Data Privacy
, vol.6
, Issue.2
, pp. 161-183
-
-
Clifton, C.1
Tassa, T.2
-
7
-
-
80052688705
-
Personal privacy vs population privacy: learning to attack anonymization
-
Cormode G. Personal privacy vs population privacy: learning to attack anonymization. In: KDD; 2011. p. 1253-61.
-
(2011)
KDD
, pp. 1253-1261
-
-
Cormode, G.1
-
8
-
-
84881395512
-
Empirical privacy and empirical utility of anonymized data
-
Cormode G, Procopiuc CM, Shen E, Srivastava D, Yu T. Empirical privacy and empirical utility of anonymized data. In: ICDE workshop on privacy-preserving data publication and analysis (PRIVDB); 2013. p. 77-82.
-
(2013)
ICDE workshop on privacy-preserving data publication and analysis (PRIVDB)
, pp. 77-82
-
-
Cormode, G.1
Procopiuc, C.M.2
Shen, E.3
Srivastava, D.4
Yu, T.5
-
9
-
-
79959954388
-
Differentially private data cubes: optimizing noise sources and consistency
-
Ding B, Winslett M, Han J, Li Z. Differentially private data cubes: optimizing noise sources and consistency. In: SIGMOD; 2011. p. 217-28.
-
(2011)
SIGMOD
, pp. 217-228
-
-
Ding, B.1
Winslett, M.2
Han, J.3
Li, Z.4
-
10
-
-
1142275486
-
Revealing information while preserving privacy
-
Dinur I, Nissim K. Revealing information while preserving privacy. In: PODS; 2003. p. 202-10.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
11
-
-
0011583645
-
Disclosure risk vs data utility: the R-U confidentiality map
-
Technical report number 121, National Institute of Statistical Sciences; December
-
Duncan GT, Keller-McNulty SA, Stokes SL. Disclosure risk vs data utility: the R-U confidentiality map. In: Technical report number 121, National Institute of Statistical Sciences; December 2001.
-
(2001)
-
-
Duncan, G.T.1
Keller-McNulty, S.A.2
Stokes, S.L.3
-
13
-
-
78650804208
-
A firm foundation for private data analysis
-
Dwork C. A firm foundation for private data analysis. Commun ACM 2011, 54(1):86-95.
-
(2011)
Commun ACM
, vol.54
, Issue.1
, pp. 86-95
-
-
Dwork, C.1
-
15
-
-
0002646970
-
On the question of statistical confidentiality
-
Feliegi I. On the question of statistical confidentiality. J Am Stat Assoc 1972, 67(337):7-18.
-
(1972)
J Am Stat Assoc
, vol.67
, Issue.337
, pp. 7-18
-
-
Feliegi, I.1
-
16
-
-
0005616406
-
Getting a personal dossier from a statistical data bank
-
Hoffman L., Miller W.F. Getting a personal dossier from a statistical data bank. Datamation 1970, 16(5):74-75.
-
(1970)
Datamation
, vol.16
, Issue.5
, pp. 74-75
-
-
Hoffman, L.1
Miller, W.F.2
-
17
-
-
29844455635
-
Models and methods for the microdata protection problem
-
Hurkens C.J., Tiourine S. Models and methods for the microdata protection problem. J Off Stat 1998, 437-447.
-
(1998)
J Off Stat
, pp. 437-447
-
-
Hurkens, C.J.1
Tiourine, S.2
-
18
-
-
70849111568
-
Attacks on privacy and definetti's theorem
-
Kifer D. Attacks on privacy and definetti's theorem. In: SIGMOD; 2009. p. 127-38.
-
(2009)
SIGMOD
, pp. 127-138
-
-
Kifer, D.1
-
21
-
-
85011019712
-
The boundary between privacy and utility in data publishing
-
Rastogi V, Suciu D, Hong S. The boundary between privacy and utility in data publishing. In: VLDB; 2007. p. 531-42.
-
(2007)
VLDB
, pp. 531-542
-
-
Rastogi, V.1
Suciu, D.2
Hong, S.3
-
22
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati P. Protecting respondents' identities in microdata release. IEEE Trans Knowl Data Eng 2001, 13(6).
-
(2001)
IEEE Trans Knowl Data Eng
, vol.13
, Issue.6
-
-
Samarati, P.1
-
24
-
-
84893451427
-
Improving the utility of differentially private data releases via k-anonymity
-
Soria-Comas J, Domingo-Ferrer J, Sánchez D, Martínez S. Improving the utility of differentially private data releases via k-anonymity. In: 12th IEEE international conference on trust, security and privacy in computing and communications; 2013. p. 371-9.
-
(2013)
12th IEEE international conference on trust, security and privacy in computing and communications
, pp. 371-379
-
-
Soria-Comas, J.1
Domingo-Ferrer, J.2
Sánchez, D.3
Martínez, S.4
-
25
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
Sweeney L. Weaving technology and policy together to maintain confidentiality. J Law Med Ethics 1997, 25(2-3):98-110.
-
(1997)
J Law Med Ethics
, vol.25
, Issue.2-3
, pp. 98-110
-
-
Sweeney, L.1
-
26
-
-
0036811662
-
K-anonymity: a model for protecting privacy
-
Sweeney L. k-anonymity: a model for protecting privacy. Int J Uncertain Fuzz Knowl Syst 2002, 10(5):557-570.
-
(2002)
Int J Uncertain Fuzz Knowl Syst
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
28
-
-
80052013720
-
Can the utility of anonymized data be used for privacy breaches
-
39
-
Wong R., Fu A., Wang K., Xu Y., Yu P., Pei J. Can the utility of anonymized data be used for privacy breaches. ACM Trans Knowl Discovery Data 2011, 5(3):1-23. 39.
-
(2011)
ACM Trans Knowl Discovery Data
, vol.5
, Issue.3
, pp. 1-23
-
-
Wong, R.1
Fu, A.2
Wang, K.3
Xu, Y.4
Yu, P.5
Pei, J.6
-
29
-
-
79959998772
-
ireduct: differential privacy with reduced relative errors
-
Xiao X, Bender G, Hay M, Gehrke J. ireduct: differential privacy with reduced relative errors. In: SIGMOD; 2011. p. 229-40.
-
(2011)
SIGMOD
, pp. 229-240
-
-
Xiao, X.1
Bender, G.2
Hay, M.3
Gehrke, J.4
-
30
-
-
84893853914
-
Anatomy: simple and effective privacy preservation
-
Xiao X, Tao Y. Anatomy: simple and effective privacy preservation. In: VLDB; 2006. p. 139-50.
-
(2006)
VLDB
, pp. 139-150
-
-
Xiao, X.1
Tao, Y.2
|