메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Privacy-Preserving Distributed Stream Monitoring

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX NETWORKS; FUNCTION EVALUATION; INTRUSION DETECTION; PRIVACY-PRESERVING TECHNIQUES;

EID: 84977870210     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23128     Document Type: Conference Paper
Times cited : (39)

References (35)
  • 3
    • 77954717626 scopus 로고    scopus 로고
    • Differential privacy under continual observation
    • C. Dwork, T. Pitassi, M. Naor, and G. N. Rothblum, “Differential privacy under continual observation,” in STOC, 2010, pp. 715–724.
    • (2010) STOC , pp. 715-724
    • Dwork, C.1    Pitassi, T.2    Naor, M.3    Rothblum, G. N.4
  • 5
    • 77955334135 scopus 로고    scopus 로고
    • Private and continual release of statistics
    • [Online]. Available
    • T. H. H. Chan, E. Shi, and D. Song, “Private and continual release of statistics,” in ICALP, 2010, pp. 405–417. [Online]. Available: http://dl.acm.org/citation.cfm?id=1880999.1881044
    • (2010) ICALP , pp. 405-417
    • Chan, T. H. H.1    Shi, E.2    Song, D.3
  • 6
    • 79960182242 scopus 로고    scopus 로고
    • Pan-private algorithms via statistics on sketches
    • D. J. Mir, S. Muthukrishnan, A. Nikolov, and R. N. Wright, “Pan-private algorithms via statistics on sketches,” in PODS, 2011, pp. 37–48.
    • (2011) PODS , pp. 37-48
    • Mir, D. J.1    Muthukrishnan, S.2    Nikolov, A.3    Wright, R. N.4
  • 7
    • 84871058287 scopus 로고    scopus 로고
    • Real-time aggregate monitoring with differential privacy
    • L. Fan and L. Xiong, “Real-time aggregate monitoring with differential privacy,” in CIKM, 2012, pp. 2169–2173.
    • (2012) CIKM , pp. 2169-2173
    • Fan, L.1    Xiong, L.2
  • 8
    • 84883765200 scopus 로고    scopus 로고
    • Distributed private heavy hitters
    • J. Hsu, S. Khanna, and A. Roth, “Distributed private heavy hitters,” in ICALP (1), 2012, pp. 461–472.
    • (2012) ICALP , Issue.1 , pp. 461-472
    • Hsu, J.1    Khanna, S.2    Roth, A.3
  • 10
    • 34548536332 scopus 로고    scopus 로고
    • Efficient detection of distributed constraint violations
    • S. Agrawal, S. Deb, K. V. M. Naidu, and R. Rastogi, “Efficient detection of distributed constraint violations,” in ICDE, 2007, pp. 1320–1324.
    • (2007) ICDE , pp. 1320-1324
    • Agrawal, S.1    Deb, S.2    Naidu, K. V. M.3    Rastogi, R.4
  • 12
    • 70449100958 scopus 로고    scopus 로고
    • Functional monitoring without monotonicity
    • C. Arackaparambil, J. Brody, and A. Chakrabarti, “Functional monitoring without monotonicity,” in ICALP (1), 2009, pp. 95–106.
    • (2009) ICALP , Issue.1 , pp. 95-106
    • Arackaparambil, C.1    Brody, J.2    Chakrabarti, A.3
  • 13
    • 34250689976 scopus 로고    scopus 로고
    • A geometric approach to monitoring threshold functions over distributed data streams
    • I. Sharfman, A. Schuster, and D. Keren, “A geometric approach to monitoring threshold functions over distributed data streams,” in SIGMOD, 2006, pp. 301–312.
    • (2006) SIGMOD , pp. 301-312
    • Sharfman, I.1    Schuster, A.2    Keren, D.3
  • 15
    • 34250622521 scopus 로고    scopus 로고
    • Communication-efficient distributed monitoring of thresholded counts
    • R. Keralapura, G. Cormode, and J. Ramamirtham, “Communication-efficient distributed monitoring of thresholded counts,” in SIGMOD Conference, 2006, pp. 289–300.
    • (2006) SIGMOD Conference , pp. 289-300
    • Keralapura, R.1    Cormode, G.2    Ramamirtham, J.3
  • 16
    • 1142291592 scopus 로고    scopus 로고
    • Adaptive filters for continuous queries over distributed data streams
    • C. Olston, J. Jiang, and J. Widom, “Adaptive filters for continuous queries over distributed data streams,” in SIGMOD Conference, 2003, pp. 563–574.
    • (2003) SIGMOD Conference , pp. 563-574
    • Olston, C.1    Jiang, J.2    Widom, J.3
  • 17
    • 84874716590 scopus 로고    scopus 로고
    • Differentially-private network trace analysis
    • Aug. [Online]. Available
    • F. McSherry and R. Mahajan, “Differentially-private network trace analysis,” SIGCOMM Computer Communication Review, vol. 40, no. 4, pp. 123–134, Aug. 2010. [Online]. Available: http://doi.acm.org/10.1145/1851275.1851199
    • (2010) SIGCOMM Computer Communication Review , vol.40 , Issue.4 , pp. 123-134
    • McSherry, F.1    Mahajan, R.2
  • 18
    • 84864133800 scopus 로고    scopus 로고
    • The application of differential privacy to health data
    • New York, NY, USA: ACM, [Online]. Available
    • F. K. Dankar and K. El Emam, “The application of differential privacy to health data,” in Proceedings of the 2012 Joint EDBT/ICDT Workshops, ser. EDBT-ICDT’12. New York, NY, USA: ACM, 2012, pp. 158–166. [Online]. Available: http://doi.acm.org/10.1145/2320765.2320816
    • (2012) Proceedings of the 2012 Joint EDBT/ICDT Workshops, ser. EDBT-ICDT’12 , pp. 158-166
    • Dankar, F. K.1    El Emam, K.2
  • 21
    • 33746037200 scopus 로고    scopus 로고
    • Our data, ourselves: Privacy via distributed noise generation
    • Springer
    • C. Dwork, K. Kenthapadi, F. Mcsherry, I. Mironov, and M. Naor, “Our data, ourselves: Privacy via distributed noise generation,” in EUROCRYPT. Springer, 2006, pp. 486–503.
    • (2006) EUROCRYPT , pp. 486-503
    • Dwork, C.1    Kenthapadi, K.2    Mcsherry, F.3    Mironov, I.4    Naor, M.5
  • 24
    • 77954711910 scopus 로고    scopus 로고
    • Differentially private aggregation of distributed time-series with transformation and encryption
    • V. Rastogi and S. Nath, “Differentially private aggregation of distributed time-series with transformation and encryption,” in SIGMOD, 2010, pp. 735–746.
    • (2010) SIGMOD , pp. 735-746
    • Rastogi, V.1    Nath, S.2
  • 26
    • 84864265207 scopus 로고    scopus 로고
    • Differentially private continual monitoring of heavy hitters from distributed streams
    • T. H. H. Chan, M. Li, E. Shi, and W. Xu, “Differentially private continual monitoring of heavy hitters from distributed streams,” in Privacy Enhancing Technologies, 2012, pp. 140–159.
    • (2012) Privacy Enhancing Technologies , pp. 140-159
    • Chan, T. H. H.1    Li, M.2    Shi, E.3    Xu, W.4
  • 29
    • 84864229980 scopus 로고    scopus 로고
    • Detecting outliers in sensor networks using the geometric approach
    • S. Burdakis and A. Deligiannakis, “Detecting outliers in sensor networks using the geometric approach,” in ICDE, 2012, pp. 1108–1119.
    • (2012) ICDE , pp. 1108-1119
    • Burdakis, S.1    Deligiannakis, A.2
  • 30
    • 84863421549 scopus 로고    scopus 로고
    • Iterative constructions and private data release
    • A. Gupta, A. Roth, and J. Ullman, “Iterative constructions and private data release,” in TCC, 2012, pp. 339–356.
    • (2012) TCC , pp. 339-356
    • Gupta, A.1    Roth, A.2    Ullman, J.3
  • 31
    • 46749128577 scopus 로고    scopus 로고
    • Mechanism design via differential privacy
    • F. McSherry and K. Talwar, “Mechanism design via differential privacy,” in FOCS, 2007, pp. 94–103.
    • (2007) FOCS , pp. 94-103
    • McSherry, F.1    Talwar, K.2
  • 32
    • 36949013219 scopus 로고    scopus 로고
    • A geometric approach to monitoring threshold functions over distributed data streams
    • Nov. [Online]. Available
    • I. Sharfman, A. Schuster, and D. Keren, “A geometric approach to monitoring threshold functions over distributed data streams,” ACM Transactions on Database Systems (TODS), vol. 32, no. 4, Nov. 2007. [Online]. Available: http://doi.acm.org/10.1145/1292609.1292613
    • (2007) ACM Transactions on Database Systems (TODS) , vol.32 , Issue.4
    • Sharfman, I.1    Schuster, A.2    Keren, D.3
  • 33
    • 84876811202 scopus 로고    scopus 로고
    • Rcv1: A new benchmark collection for text categorization research
    • Dec. [Online]. Available
    • D. D. Lewis, Y. Yang, T. G. Rose, and F. Li, “Rcv1: A new benchmark collection for text categorization research,” Journal of Machine Learning Research, vol. 5, pp. 361–397, Dec. 2004. [Online]. Available: http://dl.acm.org/citation.cfm?id=1005332.1005345
    • (2004) Journal of Machine Learning Research , vol.5 , pp. 361-397
    • Lewis, D. D.1    Yang, Y.2    Rose, T. G.3    Li, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.