-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam, N. R., and Wortmann, J. C. 1989. "Security-Control Methods for Statistical Databases: A Comparative Study", ACM Computing Surveys (21:4), pp. 515-556.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
4
-
-
66449136652
-
Adoption of electronic health records in the presence of privacy concerns: The elaboration likelihood model and individual persuasion
-
Angst, C. M., and Agarwal, R. 2009. "Adoption of Electronic Health Records in the Presence of Privacy Concerns: The Elaboration Likelihood Model and Individual Persuasion", MIS Quarterly (33:2), pp. 339-370.
-
(2009)
MIS Quarterly
, vol.33
, Issue.2
, pp. 339-370
-
-
Angst, C.M.1
Agarwal, R.2
-
5
-
-
45749101998
-
Anonymity preserving pattern discovery
-
Atzori, M., Bonchi, F., Giannotti, F., and Pedreschi, D. 2008. "Anonymity Preserving Pattern Discovery", The VLDB Journal (17:4), pp. 703-727.
-
(2008)
The VLDB Journal
, vol.17
, Issue.4
, pp. 703-727
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
-
6
-
-
84886567160
-
Uci machine learning repository
-
University of California, Irvine
-
Bache, K., and Lichman, M. 2013. "UCI Machine Learning Repository", Center for Machine Learning and Intelligent Systems, School of Information and Computer Science, University of California, Irvine (http://archive.ics.uci.edu/ml).
-
(2013)
Center for Machine Learning and Intelligent Systems, School of Information and Computer Science
-
-
Bache, K.1
Lichman, M.2
-
7
-
-
0003802343
-
-
Belmont, CA: Wadsworth
-
Breiman, L., Friedman, J. H., Olshen, R. A., and Stone, C. J. 1984. Classification and Regression Trees, Belmont, CA: Wadsworth.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
8
-
-
75949123863
-
Anonymizing bipartite graph data using safe groupings
-
Cormode, G., Srivastava, D., Yu, T., and Zhang, Q. 2010. "Anonymizing Bipartite Graph Data Using Safe Groupings", The VLDB Journal (19:1), pp. 115-139.
-
(2010)
The VLDB Journal
, vol.19
, Issue.1
, pp. 115-139
-
-
Cormode, G.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
9
-
-
84944954698
-
Decision tree: The obama-clinton divide
-
April 16
-
Cox, A. 2008. "Decision Tree: The Obama-Clinton Divide", The New York Times, April 16 (http://www.nytimes.com/imagepages/2008/04/16/us/20080416-OBAMA-GRAPHIC.html).
-
(2008)
The New York Times
-
-
Cox, A.1
-
10
-
-
0001501223
-
'How did they get my name?': An exploratory investigation of consumer attitudes toward secondary information use
-
Culnan, M. 1993. "'How Did They Get My Name?': An Exploratory Investigation of Consumer Attitudes toward Secondary Information Use", MIS Quarterly (17:3), pp. 341-363.
-
(1993)
MIS Quarterly
, vol.17
, Issue.3
, pp. 341-363
-
-
Culnan, M.1
-
11
-
-
0011153447
-
Multivariate regression trees: A new technique for modeling species-environmental relationships
-
De'ath, G. 2002. "Multivariate Regression Trees: A New Technique for Modeling Species-Environmental Relationships", Ecology (83:4), pp. 1105-1117.
-
(2002)
Ecology
, vol.83
, Issue.4
, pp. 1105-1117
-
-
De'Ath, G.1
-
12
-
-
0020779363
-
Inference control for statistical databases
-
Denning, D. E., and Schlörer, J. 1983. "Inference Control for Statistical Databases", Computer (16:7), pp. 69-82.
-
(1983)
Computer
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.E.1
Schlörer, J.2
-
13
-
-
84893374768
-
How companies learn your secrets
-
February 16, p. 10
-
Duhigg, C. 2012. "How Companies Learn Your Secrets", The New York Times Magazine, February 16, p. 10.
-
(2012)
The New York Times Magazine
-
-
Duhigg, C.1
-
14
-
-
84952535404
-
The risk of disclosure for microdata
-
Duncan, G. T., and Lambert, D. 1989. "The Risk of Disclosure for Microdata", Journal of Business and Economic Statistics (7:2), pp. 201-217.
-
(1989)
Journal of Business and Economic Statistics
, vol.7
, Issue.2
, pp. 201-217
-
-
Duncan, G.T.1
Lambert, D.2
-
15
-
-
45749151381
-
Providing k-anonymity in data mining
-
Friedman, A., Schuster, A., and Wolff, R. 2008. "Providing k-Anonymity in Data Mining", International Journal on Very Large Data Bases (17:4), pp. 789-804.
-
(2008)
International Journal on Very Large Data Bases
, vol.17
, Issue.4
, pp. 789-804
-
-
Friedman, A.1
Schuster, A.2
Wolff, R.3
-
16
-
-
82955228457
-
A privacy protection technique for publishing data mining models and research data
-
Fu, Y., Chen, Z., Koru, G., and Gangopadhyay, A. 2010. "A Privacy Protection Technique for Publishing Data Mining Models and Research Data", ACM Transactions on Management Information Systems (1:1), Article 7, pp. 7:1-7:20.
-
(2010)
ACM Transactions on Management Information Systems
, vol.1
, Issue.1
, pp. 71-720
-
-
Fu, Y.1
Chen, Z.2
Koru, G.3
Gangopadhyay, A.4
-
17
-
-
34047165799
-
Anonymizing classification data for privacy preservation
-
Fung, B. C. M., Wang, K., and Yu, P. S. 2007. "Anonymizing Classification Data for Privacy Preservation", IEEE Transactions on Knowledge and Data Engineering (19:5), pp. 711-725.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.5
, pp. 711-725
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
19
-
-
34247541615
-
Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information
-
Garfinkel, R., Gopal, R., and Thompson, S. 2007. "Releasing Individually Identifiable Microdata with Privacy Protection against Stochastic Threat: An Application to Health Information", Information Systems Research (18:1), pp. 23-41.
-
(2007)
Information Systems Research
, vol.18
, Issue.1
, pp. 23-41
-
-
Garfinkel, R.1
Gopal, R.2
Thompson, S.3
-
20
-
-
84897584743
-
Preventing private information inference attacks on social networks
-
Heatherly, R., Kantarcioglu, M., Thuraisingham, B. 2013. "Preventing Private Information Inference Attacks on Social Networks", IEEE Transactions on Knowledge and Data Engineering (25:8), pp. 1849-1862.
-
(2013)
IEEE Transactions on Knowledge and Data Engineering
, vol.25
, Issue.8
, pp. 1849-1862
-
-
Heatherly, R.1
Kantarcioglu, M.2
Thuraisingham, B.3
-
22
-
-
0035607552
-
The effect of physician advice on alcohol consumption: Count regression with an endogenous treatment effect
-
Kenkel, D. S., and Terza, J. V. 2001. "The Effect of Physician Advice on Alcohol Consumption: Count Regression with an Endogenous Treatment Effect", Journal of Applied Econometrics (16:2), pp. 165-184.
-
(2001)
Journal of Applied Econometrics
, vol.16
, Issue.2
, pp. 165-184
-
-
Kenkel, D.S.1
Terza, J.V.2
-
24
-
-
0000964471
-
Measures of disclosure risk and harm
-
Lambert, D. 1993. "Measures of Disclosure Risk and Harm", Journal of Official Statistics (9:2), pp. 313-331.
-
(1993)
Journal of Official Statistics
, vol.9
, Issue.2
, pp. 313-331
-
-
Lambert, D.1
-
25
-
-
51149098991
-
Workload-aware anonymization techniques for large-scale datasets
-
Le Fevre, K., De Witt, D. J., and Ramakrishnan, R. 2008. "Workload-Aware Anonymization Techniques for Large-Scale Datasets", ACM Transactions on Database Systems (33:3), Article 17, pp. 17:1-17:47.
-
(2008)
ACM Transactions on Database Systems
, vol.33
, Issue.3
, pp. 171-1747
-
-
Le Fevre, K.1
De Witt, D.J.2
Ramakrishnan, R.3
-
26
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
IEEE Computer Society, Washington, DC
-
Li, N., Li, T., and Venkatasubramanian, S. 2007. "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity", in Proceedings of the 23rd IEEE International Conference on Data Engineering, IEEE Computer Society, Washington, DC, pp. 106-115.
-
(2007)
Proceedings of the 23rd IEEE International Conference on Data Engineering
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
27
-
-
73649136135
-
Against classification attacks: A decision tree pruning approach to privacy protection in data mining
-
Li, X.-B., and Sarkar, S. 2009. "Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining", Operations Research (57:6), pp. 1496-1509.
-
(2009)
Operations Research
, vol.57
, Issue.6
, pp. 1496-1509
-
-
Li, X.-B.1
Sarkar, S.2
-
28
-
-
84865106994
-
Protecting privacy against record linkage disclosure: A bounded swapping approach for numeric data
-
Li, X.-B., and Sarkar, S. 2011. "Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data", Information Systems Research (22:4), pp. 774-789.
-
(2011)
Information Systems Research
, vol.22
, Issue.4
, pp. 774-789
-
-
Li, X.-B.1
Sarkar, S.2
-
29
-
-
0022130080
-
A data distortion by probability distribution
-
Liew, C. K., Choi, U. J., and Liew, C. J. 1985. "A Data Distortion by Probability Distribution", ACM Transactions on Database Systems (10:3), pp. 395-411.
-
(1985)
ACM Transactions on Database Systems
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.K.1
Choi, U.J.2
Liew, C.J.3
-
30
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
IEEE Computer Society, Washington, DC
-
Machanavajjhala, A., Gehrke, J., Kifer, D., and Venkitasubramaniam, M. 2006. "l-Diversity: Privacy Beyond k-Anonymity", in Proceedings of 22nd IEEE International Conference on Data Engineering, IEEE Computer Society, Washington, DC, pp. 24-35.
-
(2006)
Proceedings of 22nd IEEE International Conference on Data Engineering
, pp. 24-35
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
32
-
-
33847045247
-
Minimizing information loss and preserving privacy
-
Menon, S., and Sarkar, S. 2007. "Minimizing Information Loss and Preserving Privacy", Management Science (53:1), pp. 102-116.
-
(2007)
Management Science
, vol.53
, Issue.1
, pp. 102-116
-
-
Menon, S.1
Sarkar, S.2
-
35
-
-
84896282697
-
Don't Build a Database of Ruin
-
August 23
-
Ohm, P. 2012. "Don't Build a Database of Ruin", Harvard Business Review HRB Blog Network, August 23 (http://blogs.hbr.org/cs/2012/08/dont-build-a-database-of-ruin.html).
-
(2012)
Harvard Business Review HRB Blog Network
-
-
Ohm, P.1
-
36
-
-
33646056672
-
A unified framework for protecting sensitive association rules in business collaboration
-
Oliveira, S. R. M., and Zaiane, O. R. 2006. "A Unified Framework for Protecting Sensitive Association Rules in Business Collaboration", International Journal of Business Intelligence and Data Mining (1:3), pp. 247-287.
-
(2006)
International Journal of Business Intelligence and Data Mining
, vol.1
, Issue.3
, pp. 247-287
-
-
Oliveira, S.R.M.1
Zaiane, O.R.2
-
37
-
-
4344559647
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
IEEE Computer Society, Washington, DC
-
Samarati, P., and Sweeney, L. 1998. "Protecting Privacy When Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression", in Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society, Washington, DC.
-
(1998)
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Samarati, P.1
Sweeney, L.2
-
38
-
-
81355150537
-
Information privacy research: An interdisciplinary review
-
Smith, H. J., Dinev, T., and Xu, H. 2011. "Information Privacy Research: An Interdisciplinary Review", MIS Quarterly (35:4), pp. 989-1015.
-
(2011)
MIS Quarterly
, vol.35
, Issue.4
, pp. 989-1015
-
-
Smith, H.J.1
Dinev, T.2
Xu, H.3
-
40
-
-
2142754478
-
Association rule hiding
-
Verykios, V. S., Elmagarmid, A. K., Bertino, E., Saygin, Y., and Dasseni, E. 2004. "Association Rule Hiding", IEEE Transactions on Knowledge and Data Engineering (16:4), pp. 434-447.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
-
41
-
-
77954584058
-
To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
-
New York: ACM Press
-
Zheleva, E., and Getoor, L. 2009. "To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles", in Proceedings of the 18th International Conference on World Wide Web, New York: ACM Press, pp. 531-540.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web
, pp. 531-540
-
-
Zheleva, E.1
Getoor, L.2
|