메뉴 건너뛰기




Volumn 29-June-2015, Issue , 2015, Pages

Orthogonal mechanism for answering batch queries with differential privacy

Author keywords

Algorithms; Data Mining; Differential Privacy

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; DATA MINING; MANAGEMENT INFORMATION SYSTEMS; QUERY PROCESSING;

EID: 84959469775     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2791347.2791378     Document Type: Conference Paper
Times cited : (6)

References (32)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. R. Adam and J. C. Worthmann. Security-control methods for statistical databases: A comparative study. ACM Computing Surveys (CSUR), 21(4):515-556, 1989.
    • (1989) ACM Computing Surveys (CSUR) , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Worthmann, J.C.2
  • 4
    • 65449147584 scopus 로고    scopus 로고
    • The cost of privacy: Destruction of data-mining utility in anonymized data publishing
    • J. Brickell and V. Shmatikov. The cost of privacy: destruction of data-mining utility in anonymized data publishing. In Proceedings of the 14th ACM SIGKDD, pages 70-78, 2008.
    • (2008) Proceedings of the 14th, ACM SIGKDD , pp. 70-78
    • Brickell, J.1    Shmatikov, V.2
  • 7
    • 26944441439 scopus 로고
    • The invasion of privacy problem and statistics productionâ A Tan overview
    • T. Dalenius. The invasion of privacy problem and statistics productionâ A Tan overview. Statistik Tidskrift, 12:213-225, 1974.
    • (1974) Statistik Tidskrift , vol.12 , pp. 213-225
    • Dalenius, T.1
  • 8
    • 79959954388 scopus 로고    scopus 로고
    • Differentially private data cubes: Optimizing noise sources and consistency
    • B. Ding, M. Winslett, J. Han, and Z. Li. Differentially private data cubes: optimizing noise sources and consistency. In Proceedings of the ACM SIGMOD, pages 217-228, 2011.
    • (2011) Proceedings of the ACM SIGMOD , pp. 217-228
    • Ding, B.1    Winslett, M.2    Han, J.3    Li, Z.4
  • 11
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • Springer
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography, pages 265-284. Springer, 2006.
    • (2006) Theory of Cryptography , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 14
    • 78650518102 scopus 로고    scopus 로고
    • Boosting the accuracy of differentially private histograms through consistency
    • M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. Proceedings of the VLDB Endowment, 3(1-2):1021-1032, 2010.
    • (2011) Proceedings of the VLDB Endowment , vol.3 , Issue.1-2 , pp. 1021-1032
    • Hay, M.1    Rastogi, V.2    Miklau, G.3    Suciu, D.4
  • 15
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • V. S. Iyengar. Transforming data to satisfy privacy constraints. In Proceedings of the eighth ACM SIGKDD, pages 279-288, 2002.
    • (2002) Proceedings of the Eighth ACM SIGKDD , pp. 279-288
    • Iyengar, V.S.1
  • 18
    • 34548805858 scopus 로고    scopus 로고
    • Venkatasubramanian.T-closeness: Privacy beyond k-Anonymity and l-diversity
    • N. Li, T. Li, and S. Venkatasubramanian.T-closeness: Privacy beyond k-Anonymity and l-diversity. In IEEE 23rd International Conference on Data Engineering, pages 106-115, 2007.
    • (2007) IEEE 23rd International Conference on Data Engineering , pp. 106-115
    • Li, N.1    Li, S.T.2
  • 20
    • 70350678967 scopus 로고    scopus 로고
    • Differentially private recommender systems: Building privacy into the net
    • F. McSherry and I. Mironov. Differentially private recommender systems: building privacy into the net. In Proceedings of the 15th ACM SIGKDD, pages 627-636, 2009.
    • (2009) Proceedings of the 15th ACM SIGKDD , pp. 627-636
    • McSherry, F.1    Mironov, I.2
  • 22
    • 70849116921 scopus 로고    scopus 로고
    • Privacy integrated queries: An extensible platform for privacy-preserving data analysis
    • F. D. McSherry. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. In Proceedings of the 2009 ACM SIGMOD, pages 19-30, 2009.
    • Proceedings of The, 2009, ACM SIGMOD , vol.2009 , pp. 19-30
    • McSherry, F.D.1
  • 25
    • 70350686724 scopus 로고    scopus 로고
    • Anonymizing healthcare data: A case study on the blood transfusion service
    • N. Mohammed, B. Fung, P. C. Hung, and C.-k. Lee. Anonymizing healthcare data: A case study on the blood transfusion service. In Proceedings of the 15th ACM SIGKDD, pages 1285-1294, 2009.
    • (2009) Proceedings of the 15th ACM SIGKDD , pp. 1285-1294
    • Mohammed, N.1    Fung, B.2    Hung, P.C.3    Lee, C.-K.4
  • 26
    • 84976672368 scopus 로고
    • The use of regression methodology for the compromise of confidential information in statistical databases
    • M. A. Palley and J. S. Simonoff. The use of regression methodology for the compromise of confidential information in statistical databases. ACM Transactions on Database Systems (TODS), 12(4):593-608, 1987.
    • (1987) ACM, Transactions on Database Systems (TODS , vol.12 , Issue.4 , pp. 593-608
    • Palley, M.A.1    Simonoff, J.S.2
  • 27
    • 77954711910 scopus 로고    scopus 로고
    • Differentially private aggregation of distributed time-series with transformation and encryption
    • V. Rastogi and S. Nath. Differentially private aggregation of distributed time-series with transformation and encryption. In Proceedings of the ACM SIGMOD, pages 735-746, 2010.
    • (2011) Proceedings of the ACM SIGMOD , pp. 735-746
    • Rastogi, V.1    Nath, S.2
  • 30
    • 78649814930 scopus 로고    scopus 로고
    • Differentially private data release through multidimensional partitioning
    • Springer
    • Y. Xiao, L. Xiong, and C. Yuan. Differentially private data release through multidimensional partitioning. In Secure Data Management, pages 150-168. Springer, 2010.
    • (2011) Secure Data Management , pp. 150-168
    • Xiao, Y.1    Xiong, L.2    Yuan, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.