메뉴 건너뛰기




Volumn 2015-May, Issue , 2015, Pages 747-762

Bayesian differential privacy on correlated data

Author keywords

Differential privacy; Gaussian markov random field; Optimization; Output perturbation; Private data analysis

Indexed keywords

ALGORITHMS; MARKOV PROCESSES; OPTIMIZATION;

EID: 84957591290     PISSN: 07308078     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2723372.2747643     Document Type: Conference Paper
Times cited : (188)

References (25)
  • 1
    • 33244468835 scopus 로고    scopus 로고
    • Practical privacy: The sulq framework
    • New York, NY, USA, ACM
    • A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the sulq framework. In PODS, pages 128-138, New York, NY, USA, 2005. ACM.
    • (2005) PODS , pp. 128-138
    • Blum, A.1    Dwork, C.2    McSherry, F.3    Nissim, K.4
  • 2
    • 57049136138 scopus 로고    scopus 로고
    • A learning theory approach to non-interactive database privacy
    • A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609-617, 2008.
    • (2008) STOC , pp. 609-617
    • Blum, A.1    Ligett, K.2    Roth, A.3
  • 3
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
    • (2003) PODS , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 4
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • Springer
    • C. Dwork, F. Mcsherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284. Springer, 2006.
    • (2006) TCC , pp. 265-284
    • Dwork, C.1    Mcsherry, F.2    Nissim, K.3    Smith, A.4
  • 5
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving datamining on vertically partitioned databases
    • Springer
    • C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO, pages 528-544. Springer, 2004.
    • (2004) CRYPTO , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 7
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS, pages 211-222, 2003.
    • (2003) PODS , pp. 211-222
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 8
  • 9
    • 79953187235 scopus 로고    scopus 로고
    • Towards privacy for social networks: A zero-knowledge based definition of privacy
    • J. Gehrke, E. Lui, and R. Pass. Towards privacy for social networks: A zero-knowledge based definition of privacy. In TCC, pages 432-449, 2011.
    • (2011) TCC , pp. 432-449
    • Gehrke, J.1    Lui, E.2    Pass, R.3
  • 10
    • 70350683770 scopus 로고    scopus 로고
    • Universally utility-maximizing privacy mechanisms
    • A. Ghosh, T. Roughgarden, and M. Sundararajan. Universally utility-maximizing privacy mechanisms. In STOC, pages 351-360, 2009.
    • (2009) STOC , pp. 351-360
    • Ghosh, A.1    Roughgarden, T.2    Sundararajan, M.3
  • 11
    • 77951192010 scopus 로고    scopus 로고
    • Accurate estimation of the degree distribution of private networks
    • M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In ICDM, pages 169-178, 2009.
    • (2009) ICDM , pp. 169-178
    • Hay, M.1    Li, C.2    Miklau, G.3    Jensen, D.4
  • 12
    • 84904352532 scopus 로고    scopus 로고
    • Blowfish privacy: Tuning privacy-utility trade-offs using policies
    • X. He, A. Machanavajjhala, and B. Ding. Blowfish privacy: Tuning privacy-utility trade-offs using policies. In SIGMOD, pages 1447-1458, 2014.
    • (2014) SIGMOD , pp. 1447-1458
    • He, X.1    Machanavajjhala, A.2    Ding, B.3
  • 14
    • 70849111568 scopus 로고    scopus 로고
    • Attacks on privacy and definetti's theorem
    • D. Kifer. Attacks on privacy and definetti's theorem. In SIGMOD, pages 127-138, 2009.
    • (2009) SIGMOD , pp. 127-138
    • Kifer, D.1
  • 15
    • 77954711591 scopus 로고    scopus 로고
    • Towards an axiomatization of statistical privacy and utility
    • D. Kifer and B.-R. Lin. Towards an axiomatization of statistical privacy and utility. In PODS, pages 147-158, 2010.
    • (2010) PODS , pp. 147-158
    • Kifer, D.1    Lin, B.-R.2
  • 16
    • 79959983519 scopus 로고    scopus 로고
    • No free lunch in data privacy
    • D. Kifer and A. Machanavajjhala. No free lunch in data privacy. In SIGMOD, pages 193-204, 2011.
    • (2011) SIGMOD , pp. 193-204
    • Kifer, D.1    Machanavajjhala, A.2
  • 17
    • 84893284736 scopus 로고    scopus 로고
    • Pufferfish: A framework for mathematical privacy definitions
    • Jan.
    • D. Kifer and A. Machanavajjhala. Pufferfish: A framework for mathematical privacy definitions. ACM Trans. Database Syst., 39(1):3:1-3:36, Jan. 2014.
    • (2014) ACM Trans. Database Syst. , vol.39 , Issue.1 , pp. 31-336
    • Kifer, D.1    Machanavajjhala, A.2
  • 20
    • 3142686877 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, pages 575-586, 2004.
    • (2004) SIGMOD , pp. 575-586
    • Miklau, G.1    Suciu, D.2
  • 22
    • 35448955271 scopus 로고    scopus 로고
    • Smooth sensitivity and sampling in private data analysis
    • K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75-84, 2007.
    • (2007) STOC , pp. 75-84
    • Nissim, K.1    Raskhodnikova, S.2    Smith, A.3
  • 23
    • 70350635777 scopus 로고    scopus 로고
    • Relationship privacy: Output perturbation for queries with joins
    • V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107-116, 2009.
    • (2009) PODS , pp. 107-116
    • Rastogi, V.1    Hay, M.2    Miklau, G.3    Suciu, D.4
  • 24
    • 85011019712 scopus 로고    scopus 로고
    • The boundary between privacy and utility in data publishing
    • V. Rastogi, D. Suciu, and S. Hong. The boundary between privacy and utility in data publishing. In VLDB, pages 531-542, 2007.
    • (2007) VLDB , pp. 531-542
    • Rastogi, V.1    Suciu, D.2    Hong, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.