-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. R. Adam and J. C. Worthmann. Security-control methods for statistical databases: A comparative study. ACM Computing Surveys (CSUR), 21(4):515-556, 1989.
-
(1989)
ACM Computing Surveys (CSUR)
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
-
2
-
-
34250661905
-
Achieving anonymity via clustering
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. In Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART, pages 153-162, 2006.
-
(2006)
Proceedings of the Twenty-fifth ACM SIGMOD-SIGACT-SIGART
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
65449147584
-
The cost of privacy: Destruction of data-mining utility in anonymized data publishing
-
J. Brickell and V. Shmatikov. The cost of privacy: destruction of data-mining utility in anonymized data publishing. In Proceedings of the 14th ACM SIGKDD, pages 70-78, 2008.
-
(2008)
Proceedings of the 14th, ACM SIGKDD
, pp. 70-78
-
-
Brickell, J.1
Shmatikov, V.2
-
7
-
-
26944441439
-
The invasion of privacy problem and statistics productionâ A Tan overview
-
T. Dalenius. The invasion of privacy problem and statistics productionâ A Tan overview. Statistik Tidskrift, 12:213-225, 1974.
-
(1974)
Statistik Tidskrift
, vol.12
, pp. 213-225
-
-
Dalenius, T.1
-
8
-
-
79959954388
-
Differentially private data cubes: Optimizing noise sources and consistency
-
B. Ding, M. Winslett, J. Han, and Z. Li. Differentially private data cubes: optimizing noise sources and consistency. In Proceedings of the ACM SIGMOD, pages 217-228, 2011.
-
(2011)
Proceedings of the ACM SIGMOD
, pp. 217-228
-
-
Ding, B.1
Winslett, M.2
Han, J.3
Li, Z.4
-
11
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography, pages 265-284. Springer, 2006.
-
(2006)
Theory of Cryptography
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
14
-
-
78650518102
-
Boosting the accuracy of differentially private histograms through consistency
-
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. Proceedings of the VLDB Endowment, 3(1-2):1021-1032, 2010.
-
(2011)
Proceedings of the VLDB Endowment
, vol.3
, Issue.1-2
, pp. 1021-1032
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
15
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. S. Iyengar. Transforming data to satisfy privacy constraints. In Proceedings of the eighth ACM SIGKDD, pages 279-288, 2002.
-
(2002)
Proceedings of the Eighth ACM SIGKDD
, pp. 279-288
-
-
Iyengar, V.S.1
-
17
-
-
77954715960
-
Optimizing linear counting queries under differential privacy
-
C. Li, M. Hay, V. Rastogi, G. Miklau, and A. McGregor. Optimizing linear counting queries under differential privacy. In Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART, pages 123-134, 2010.
-
(2011)
Proceedings of the Twenty-ninth ACM SIGMOD-SIGACT-SIGART
, pp. 123-134
-
-
Li, C.1
Hay, M.2
Rastogi, V.3
Miklau, G.4
McGregor, A.5
-
18
-
-
34548805858
-
Venkatasubramanian.T-closeness: Privacy beyond k-Anonymity and l-diversity
-
N. Li, T. Li, and S. Venkatasubramanian.T-closeness: Privacy beyond k-Anonymity and l-diversity. In IEEE 23rd International Conference on Data Engineering, pages 106-115, 2007.
-
(2007)
IEEE 23rd International Conference on Data Engineering
, pp. 106-115
-
-
Li, N.1
Li, S.T.2
-
20
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the net
-
F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the net. In Proceedings of the 15th ACM SIGKDD, pages 627-636, 2009.
-
(2009)
Proceedings of the 15th ACM SIGKDD
, pp. 627-636
-
-
McSherry, F.1
Mironov, I.2
-
22
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
F. D. McSherry. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. In Proceedings of the 2009 ACM SIGMOD, pages 19-30, 2009.
-
Proceedings of The, 2009, ACM SIGMOD
, vol.2009
, pp. 19-30
-
-
McSherry, F.D.1
-
24
-
-
80052663001
-
Differentially private data release for data mining
-
N. Mohammed, R. Chen, B. Fung, and P. S. Yu. Differentially private data release for data mining. In Proceedings of the 17th ACM SIGKDD, pages 493-501, 2011.
-
(2011)
Proceedings of the 17th, ACM SIGKDD
, pp. 493-501
-
-
Mohammed, N.1
Chen, R.2
Fung, B.3
Yu, P.S.4
-
25
-
-
70350686724
-
Anonymizing healthcare data: A case study on the blood transfusion service
-
N. Mohammed, B. Fung, P. C. Hung, and C.-k. Lee. Anonymizing healthcare data: A case study on the blood transfusion service. In Proceedings of the 15th ACM SIGKDD, pages 1285-1294, 2009.
-
(2009)
Proceedings of the 15th ACM SIGKDD
, pp. 1285-1294
-
-
Mohammed, N.1
Fung, B.2
Hung, P.C.3
Lee, C.-K.4
-
26
-
-
84976672368
-
The use of regression methodology for the compromise of confidential information in statistical databases
-
M. A. Palley and J. S. Simonoff. The use of regression methodology for the compromise of confidential information in statistical databases. ACM Transactions on Database Systems (TODS), 12(4):593-608, 1987.
-
(1987)
ACM, Transactions on Database Systems (TODS
, vol.12
, Issue.4
, pp. 593-608
-
-
Palley, M.A.1
Simonoff, J.S.2
-
27
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
V. Rastogi and S. Nath. Differentially private aggregation of distributed time-series with transformation and encryption. In Proceedings of the ACM SIGMOD, pages 735-746, 2010.
-
(2011)
Proceedings of the ACM SIGMOD
, pp. 735-746
-
-
Rastogi, V.1
Nath, S.2
-
29
-
-
79959540412
-
Differential privacy via wavelet transforms
-
X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. IEEE Transactions on Knowledge and Data Engineering, 23(8):1200-1214, 2011.
-
(2011)
IEEE Transactions on Knowledge and Data Engineering
, vol.23
, Issue.8
, pp. 1200-1214
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
30
-
-
78649814930
-
Differentially private data release through multidimensional partitioning
-
Springer
-
Y. Xiao, L. Xiong, and C. Yuan. Differentially private data release through multidimensional partitioning. In Secure Data Management, pages 150-168. Springer, 2010.
-
(2011)
Secure Data Management
, pp. 150-168
-
-
Xiao, Y.1
Xiong, L.2
Yuan, C.3
-
31
-
-
84872862526
-
Low-rank mechanism: Optimizing batch queries under differential privacy
-
G. Yuan, Z. Zhang, M. Winslett, X. Xiao, Y. Yang, and Z. Hao. Low-rank mechanism: optimizing batch queries under differential privacy. Proceedings of the VLDB Endowment, 5(11):1352-1363, 2012.
-
(2012)
Proceedings of the VLDB Endowment
, vol.5
, Issue.11
, pp. 1352-1363
-
-
Yuan, G.1
Zhang, Z.2
Winslett, M.3
Xiao, X.4
Yang, Y.5
Hao, Z.6
-
32
-
-
84873178476
-
Functional mechanism: Regression analysis under differential privacy
-
J. Zhang, Z. Zhang, X. Xiao, Y. Yang, and M. Winslett. Functional mechanism: regression analysis under differential privacy. Proceedings of the VLDB Endowment, 5(11):1364-1375, 2012.
-
(2012)
Proceedings of the VLDB Endowment
, vol.5
, Issue.11
, pp. 1364-1375
-
-
Zhang, J.1
Zhang, Z.2
Xiao, X.3
Yang, Y.4
Winslett, M.5
|