-
1
-
-
84991006430
-
Lee kwan yew's speech at national day rally
-
April 20, 1987, cited in Christophen Tremewan
-
"Lee Kwan Yew's Speech at National Day Rally." The Straits Times, April 20, 1987, cited in Christophen Tremewan, http://www.privacyinternational.org/survey/phr2003/countries/singapore.htm.
-
The Straits Times
-
-
-
2
-
-
84990879845
-
-
PHC4 Pittsburg Healthcare Cost Containment Council (2002)., Pittsburg, November
-
PHC4 Pittsburg Healthcare Cost Containment Council (2002). Diabetes Hospitilization Report 2001 Data, Pittsburg, November 2002. http://www.phc4.org/adobe/Diab01.pdf.
-
(2002)
Diabetes Hospitilization Report 2001 Data
-
-
-
3
-
-
0242698195
-
On the design and quantification of privacy preserving data mining algorithms
-
D. AGRAWAL AND C. C. AGGARWAL. On the Design and Quantification of Privacy Preserving Data Mining Algorithms. In Proc. of PODS, 2001.
-
(2001)
Proc. of PODS
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
4
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. R. ADAMS AND J. C. WORTMAN. Security-control methods for statistical databases: A Comparative Study. ACM Comuting Surveys, 21(4), 1989.
-
(1989)
ACM Comuting Surveys
, vol.21
, Issue.4
-
-
Adams, N.R.1
Wortman, J.C.2
-
9
-
-
26444534381
-
Towards privacy-enhanced authorization policies and languages
-
Storrs, USA
-
C. ARDAGNA, E. DAMIANI, S. DE CAPITANI DI VIMERCATI, P. SAMARATI. Towards Privacy-Enhanced Authorization Policies and Languages. In Proc. of 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, USA, 2005.
-
(2005)
Proc. of 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
-
-
Ardagna, C.1
Damiani, E.2
De Capitani di Vimercati, S.3
Samarati, P.4
-
10
-
-
0019056889
-
A security mechanism for statistical databases
-
I. I. BECK. A Security Mechanism for Statistical Databases. ACM TODS, 5(3), 1980.
-
(1980)
ACM TODS
, vol.5
, Issue.3
-
-
Beck, I.I.1
-
11
-
-
12344313039
-
On privacy- Preserving access to distributed heterogeneous healthcare information
-
C. BOYENS, R. KRISHNAN, R. PADMAN. On Privacy- Preserving Access to Distributed Heterogeneous Healthcare Information. In Proc. of HICSS, 2004.
-
(2004)
Proc. of HICSS
-
-
Boyens, C.1
Krishnan, R.2
Padman, R.3
-
13
-
-
0020205885
-
Auditing and inference control in statistical databases
-
F. CHIN, G. OZSOYOGLU. Auditing and Inference Control in Statistical Databases. IEEE TSE, 8(6), 1982.
-
(1982)
IEEE TSE
, vol.8
, Issue.6
-
-
Chin, F.1
Ozsoyoglu, G.2
-
15
-
-
0003504808
-
Security and privacy implications of data mining
-
C. CLIFTON, D.MARKS. Security and Privacy Implications of Data Mining. In Proc. of DMKD, 1996.
-
(1996)
Proc. of DMKD
-
-
Clifton, C.1
Marks, D.2
-
18
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
W. DU, M. J. ATALLAH. Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigms Workshop, pages 11-20, 2001.
-
(2001)
New Security Paradigms Workshop
, pp. 11-20
-
-
Du, W.1
Atallah, M.J.2
-
19
-
-
77952334884
-
Using randomized response techniques for privacy-preserving data mining
-
W. DU, Z. ZHAN. Using Randomized Response Techniques for Privacy-Preserving Data Mining. In Proc. of ACM SIGKDD, 2003.
-
(2003)
Proc. of ACM SIGKDD
-
-
Du, W.1
Zhan, Z.2
-
20
-
-
0019054751
-
Secure statistical databases with random sample queries
-
D. DENNING. Secure Statistical Databases with Random Sample Queries. ACM TODS, 5(3), 1980.
-
(1980)
ACM TODS
, vol.5
, Issue.3
-
-
Denning, D.1
-
21
-
-
0018444418
-
Secure databases: Protection against user influence
-
D. DOBKIN, A. JONES, R. LIPTON. Secure Databases: Protection Against User Influence. ACM TODS, 4(1), 1979.
-
(1979)
ACM TODS
, vol.4
, Issue.1
-
-
Dobkin, D.1
Jones, A.2
Lipton, R.3
-
22
-
-
0040293741
-
An overview and classification of mediated query systems
-
R. DOMENIG, K. DITTRICH. An Overview and Classification of Mediated Query Systems. SIGMOD Record, 28(3), 1999.
-
(1999)
SIGMOD Record
, vol.28
, Issue.3
-
-
Domenig, R.1
Dittrich, K.2
-
26
-
-
0030679824
-
Managing semantic heterogeneity in databases: A theoretical perspective
-
Tucson
-
R. HULL. Managing Semantic Heterogeneity in Databases: A Theoretical Perspective. In Proc. of PODS, Tucson, 1997.
-
(1997)
Proc. of PODS
-
-
Hull, R.1
-
29
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. KARGUPTA, S. DATTA, Q. WANG, AND K. SIVAKUMAR. On the Privacy Preserving Properties of Random Data Perturbation Techniques. In Proc of ICDM, 2003.
-
(2003)
Proc of ICDM
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
32
-
-
0022130080
-
A data distortion by probability distribution
-
C. K. LIEW, U. J. CHOI, C. J. LIEW. A Data Distortion by Probability Distribution. ACM TODS, 10(3), 1985.
-
(1985)
ACM TODS
, vol.10
, Issue.3
-
-
Liew, C.K.1
Choi, U.J.2
Liew, C.J.3
-
34
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized perturbation techniques
-
H. POLAT, W. DU. Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques. In Proc. of ICDM, 2003.
-
(2003)
Proc. of ICDM
-
-
Polat, H.1
Du, W.2
-
35
-
-
0026119329
-
A model of authorization for next-generation database systems
-
F. RABITTI, E. BERTINO, W. KIM, AND D. WOELK. A Model of Authorization for Next-generation Database Systems. ACM TODS, 16(1), 1991.
-
(1991)
ACM TODS
, vol.16
, Issue.1
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
36
-
-
0035657983
-
On matching schemas automatically
-
E. RAHM, P. BERNSTEIN. On Matching Schemas Automatically. VLDB Journal, 10(4), 2001.
-
(2001)
VLDB Journal
, vol.10
, Issue.4
-
-
Rahm, E.1
Bernstein, P.2
-
37
-
-
0003483188
-
Protecting privacy when disclosing information: K-Anonymity and its enforcement through generalization and suppression
-
Oakland
-
P. SAMARATI, L. SWEENEY. Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement Through Generalization and Suppression. In Proc of IEEE Research in Security and Privacy, Oakland, 1998.
-
(1998)
Proc of IEEE Research in Security and Privacy
-
-
Samarati, P.1
Sweeney, L.2
-
38
-
-
0021622802
-
The statistical security of a statistical database
-
J. TRAUB, Y. YEMINI, H. WOZNAIKOWSKI. The Statistical Security of a Statistical Database. ACM TODS, 9(4), 1984.
-
(1984)
ACM TODS
, vol.9
, Issue.4
-
-
Traub, J.1
Yemini, Y.2
Woznaikowski, H.3
-
39
-
-
0043029204
-
Technical description of RODS: A real-Time public health surveillance system
-
Sept
-
F. -C. TSUI, J. ESPINO, V. M. DATO, P. GESTELAND et al. Technical Description of RODS: A Real-Time Public Health Surveillance System. J Am Med Inform Assoc, 10(5), pp. 399-308, Sept 2003.
-
(2003)
J Am Med Inform Assoc
, vol.10
, Issue.5
, pp. 308-399
-
-
Tsui, F.-C.1
Espino, J.2
Dato, V.M.3
Gesteland, P.4
-
40
-
-
19544380211
-
Bottom-up generalization: A data mining solution to privacy protection
-
K. WANG, P. S. YU, S. CHAKRABORTY. Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. In Proc. of ICDM, 2004.
-
(2004)
Proc. of ICDM
-
-
Wang, K.1
Yu, P.S.2
Chakraborty, S.3
-
41
-
-
32344442645
-
A new scheme on privacy-preserving data classification
-
N. ZHANG, S. WANG, W. ZHAO. A New Scheme on Privacy-Preserving Data Classification. In Proc. of SIGKDD, 2005.
-
(2005)
Proc. of SIGKDD
-
-
Zhang, N.1
Wang, S.2
Zhao, W.3
|