-
1
-
-
33244468835
-
Practical privacy: The sulq framework
-
New York, NY, USA, ACM
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the sulq framework. In PODS, pages 128-138, New York, NY, USA, 2005. ACM.
-
(2005)
PODS
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
2
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609-617, 2008.
-
(2008)
STOC
, pp. 609-617
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
3
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
4
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer
-
C. Dwork, F. Mcsherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284. Springer, 2006.
-
(2006)
TCC
, pp. 265-284
-
-
Dwork, C.1
Mcsherry, F.2
Nissim, K.3
Smith, A.4
-
5
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
Springer
-
C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO, pages 528-544. Springer, 2004.
-
(2004)
CRYPTO
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
7
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS, pages 211-222, 2003.
-
(2003)
PODS
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
9
-
-
79953187235
-
Towards privacy for social networks: A zero-knowledge based definition of privacy
-
J. Gehrke, E. Lui, and R. Pass. Towards privacy for social networks: A zero-knowledge based definition of privacy. In TCC, pages 432-449, 2011.
-
(2011)
TCC
, pp. 432-449
-
-
Gehrke, J.1
Lui, E.2
Pass, R.3
-
10
-
-
70350683770
-
Universally utility-maximizing privacy mechanisms
-
A. Ghosh, T. Roughgarden, and M. Sundararajan. Universally utility-maximizing privacy mechanisms. In STOC, pages 351-360, 2009.
-
(2009)
STOC
, pp. 351-360
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
11
-
-
77951192010
-
Accurate estimation of the degree distribution of private networks
-
M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In ICDM, pages 169-178, 2009.
-
(2009)
ICDM
, pp. 169-178
-
-
Hay, M.1
Li, C.2
Miklau, G.3
Jensen, D.4
-
12
-
-
84904352532
-
Blowfish privacy: Tuning privacy-utility trade-offs using policies
-
X. He, A. Machanavajjhala, and B. Ding. Blowfish privacy: Tuning privacy-utility trade-offs using policies. In SIGMOD, pages 1447-1458, 2014.
-
(2014)
SIGMOD
, pp. 1447-1458
-
-
He, X.1
Machanavajjhala, A.2
Ding, B.3
-
14
-
-
70849111568
-
Attacks on privacy and definetti's theorem
-
D. Kifer. Attacks on privacy and definetti's theorem. In SIGMOD, pages 127-138, 2009.
-
(2009)
SIGMOD
, pp. 127-138
-
-
Kifer, D.1
-
15
-
-
77954711591
-
Towards an axiomatization of statistical privacy and utility
-
D. Kifer and B.-R. Lin. Towards an axiomatization of statistical privacy and utility. In PODS, pages 147-158, 2010.
-
(2010)
PODS
, pp. 147-158
-
-
Kifer, D.1
Lin, B.-R.2
-
16
-
-
79959983519
-
No free lunch in data privacy
-
D. Kifer and A. Machanavajjhala. No free lunch in data privacy. In SIGMOD, pages 193-204, 2011.
-
(2011)
SIGMOD
, pp. 193-204
-
-
Kifer, D.1
Machanavajjhala, A.2
-
17
-
-
84893284736
-
Pufferfish: A framework for mathematical privacy definitions
-
Jan.
-
D. Kifer and A. Machanavajjhala. Pufferfish: A framework for mathematical privacy definitions. ACM Trans. Database Syst., 39(1):3:1-3:36, Jan. 2014.
-
(2014)
ACM Trans. Database Syst.
, vol.39
, Issue.1
, pp. 31-336
-
-
Kifer, D.1
Machanavajjhala, A.2
-
20
-
-
3142686877
-
A formal analysis of information disclosure in data exchange
-
G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, pages 575-586, 2004.
-
(2004)
SIGMOD
, pp. 575-586
-
-
Miklau, G.1
Suciu, D.2
-
22
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75-84, 2007.
-
(2007)
STOC
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
23
-
-
70350635777
-
Relationship privacy: Output perturbation for queries with joins
-
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107-116, 2009.
-
(2009)
PODS
, pp. 107-116
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
24
-
-
85011019712
-
The boundary between privacy and utility in data publishing
-
V. Rastogi, D. Suciu, and S. Hong. The boundary between privacy and utility in data publishing. In VLDB, pages 531-542, 2007.
-
(2007)
VLDB
, pp. 531-542
-
-
Rastogi, V.1
Suciu, D.2
Hong, S.3
-
25
-
-
84904281795
-
Privbayes: Private data release via Bayesian networks
-
J. Zhang, G. Cormode, C. M. Procopiuc, D. Srivastava, and X. Xiao. Privbayes: Private data release via bayesian networks. In SIGMOD, pages 1423-1434, 2014.
-
(2014)
SIGMOD
, pp. 1423-1434
-
-
Zhang, J.1
Cormode, G.2
Procopiuc, C.M.3
Srivastava, D.4
Xiao, X.5
|