-
1
-
-
34250661905
-
Achieving anonymity via clustering
-
New York: ACM Press
-
Aggarwal, G, Feder, T, Kenthapadi, K, Khuller, S, Panigrahy, R, Thomas, D, and Zhu, A. 2006. “ Achieving anonymity via clustering ”. In Proc. of the 25th ACM symposium on principles of database systems, 153–162. New York:ACM Press.
-
(2006)
Proc. of the 25th ACM symposium on principles of database systems
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
2
-
-
28444449426
-
-
Proc. of the 21st international conference on data engineering, IEEE Computer Society
-
Bayardo, RJ, and Agrawal, R. 2005. Data privacy through optimal k-anonymization. Proc. of the 21st international conference on data engineering. 2005. pp. 217–228. IEEE Computer Society.
-
(2005)
Data privacy through optimal k-anonymization
, pp. 217-228
-
-
Bayardo, R.J.1
Agrawal, R.2
-
4
-
-
33745844081
-
Location Privacy in Ubiquitous Computing
-
University of Cambridge
-
Beresford, AR. 2005. “ Location Privacy in Ubiquitous Computing ”. In Thesis (PhD), University of Cambridge.
-
(2005)
Thesis (PhD)
-
-
Beresford, A.R.1
-
5
-
-
85020160358
-
Anonymity in location-based services: towards a general framework
-
Washington, DC: IEEE Computer Society
-
Bettini, C, Mascetti, S, Wang, XS, and Jajodia, S. 2007. “ Anonymity in location-based services:towards a general framework ”. In Proc. of the 8th international conference on mobile data management (MDM), Washington, DC:IEEE Computer Society.
-
(2007)
Proc. of the 8th international conference on mobile data management (MDM)
-
-
Bettini, C.1
Mascetti, S.2
Wang, X.S.3
Jajodia, S.4
-
6
-
-
33646153058
-
Protecting privacy against location-based personal identification
-
Heidelberg: Springer, 3674 of LNCS
-
Bettini, C, Wang, XS, and Jajodia, S. 2005. “ Protecting privacy against location-based personal identification ”. In Proc. of the 2nd workshop on secure data management (SDM), 185–199. Heidelberg:Springer. 3674 of LNCS
-
(2005)
Proc. of the 2nd workshop on secure data management (SDM)
, pp. 185-199
-
-
Bettini, C.1
Wang, X.S.2
Jajodia, S.3
-
7
-
-
38149096067
-
The role of quasi-identifiers in k-anonymity revisited
-
Milan: DICo, University of Milan
-
Bettini, C, Wang, XS, and Jajodia, S. 2006. “ The role of quasi-identifiers in k-anonymity revisited ”. In Technical Report RT-11-06, Milan:DICo, University of Milan.
-
(2006)
Technical Report RT-11-06
-
-
Bettini, C.1
Wang, X.S.2
Jajodia, S.3
-
8
-
-
0036606530
-
A framework for generating network-based moving objects
-
Brinkhoff, T. 2002. A framework for generating network-based moving objects. GeoInformatica, 6 (2):153–180.
-
(2002)
GeoInformatica
, vol.6
, Issue.2
, pp. 153-180
-
-
Brinkhoff, T.1
-
9
-
-
33750732631
-
Secure anonymization for incremental datasets
-
Heidelberg: Springer
-
Byun, J-W, Sohn, Y, Bertino, E, and Li, N. 2006. “ Secure anonymization for incremental datasets ”. In Proc. of third VLDB workshop on secure data management. Lecture Notes in Computer Science, Heidelberg:Springer.
-
(2006)
Proc. of third VLDB workshop on secure data management. Lecture Notes in Computer Science
-
-
Byun, J.-W.1
Sohn, Y.2
Bertino, E.3
Li, N.4
-
11
-
-
0000072558
-
Finding a needle in a haystack - or identifying anonymous census record
-
Dalenius, T. 1986. Finding a needle in a haystack - or identifying anonymous census record. Journal of Official Statistics, 2 (3):329–336.
-
(1986)
Journal of Official Statistics
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
12
-
-
33745725717
-
An anonymous communication technique using dummies for location-based services
-
Washington, DC: IEEE Computer Society
-
Kido, H, Yanagisawa, Y, and Satoh, T. 2005. “ An anonymous communication technique using dummies for location-based services ”. In Proc. of the international conference on pervasive services (ICPS), 88–97. Washington, DC:IEEE Computer Society.
-
(2005)
Proc. of the international conference on pervasive services (ICPS)
, pp. 88-97
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
13
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
Washington, DC: IEEE Computer Society
-
LeFevre, K, DeWitt, DJ, and Ramakrishnan, R. 2006. “ Mondrian multidimensional k-anonymity ”. In Proc of the 22nd international conference on data engineering (ICDE)., Washington, DC:IEEE Computer Society.
-
(2006)
Proc of the 22nd international conference on data engineering (ICDE)
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
16
-
-
35648982949
-
Preserving location-based identity inference in anonymous spatial queries
-
Kalnis, P, Ghinta, G, Mouratidis, K, and Papadias, D. 2007. Preserving location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19 (12):1719–1733.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinta, G.2
Mouratidis, K.3
Papadias, D.4
-
17
-
-
35348924316
-
-
Proc. of the 16th international conference on World Wide Web, New York: ACM Press
-
Ghinita, G, Kalnis, P, and Skiadopoulos, S. 2007. Prive:anonymous location-based queries in distributed mobile systems. Proc. of the 16th international conference on World Wide Web. 2007. pp. 371–380. New York:ACM Press.
-
(2007)
Prive: anonymous location-based queries in distributed mobile systems
, pp. 371-380
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
19
-
-
33749607006
-
-
Proc. of the 22nd international conference on data engineering, Washington, DC: IEEE Computer Society
-
Machanavajjhala, A, Gehrke, J, Kifer, D, and Venkitasubramaniam, M. 2006. l-diversity:privacy beyond k-anonymity. Proc. of the 22nd international conference on data engineering. 2006. Vol. 24, Washington, DC:IEEE Computer Society.
-
(2006)
l-diversity: privacy beyond k-anonymity
, vol.24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
20
-
-
85024198356
-
-
Proc. of the 1st international workshop on privacy-aware location-based mobile services (PALMS), Washington, DC: IEEE Computer Society
-
Mascetti, S, and Bettini, C. 2007. A comparison of spatial generalization algorithms for LBS privacy preservation. Proc. of the 1st international workshop on privacy-aware location-based mobile services (PALMS). 2007. Washington, DC:IEEE Computer Society.
-
(2007)
A comparison of spatial generalization algorithms for LBS privacy preservation
-
-
Mascetti, S.1
Bettini, C.2
-
21
-
-
33751394416
-
-
Proc. of 13th international symposium on temporal representation and reasoning, Washington, DC: IEEE Computer Society
-
Mascetti, S, Bettini, C, Wang, XS, and Jajodia, S. 2006. k-anonymity in databases with timestamped data. Proc. of 13th international symposium on temporal representation and reasoning. 2006. Washington, DC:IEEE Computer Society.
-
(2006)
k-anonymity in databases with timestamped data
-
-
Mascetti, S.1
Bettini, C.2
Wang, X.S.3
Jajodia, S.4
-
22
-
-
34547720006
-
-
Proc. of the 32nd international conference on very large data bases (VLDB), New York: ACM Press, VLDB Endowment
-
Mokbel, MF, Chow, C-Y, and Aref, WG. 2006. The new casper:query processing for location services without compromising privacy. Proc. of the 32nd international conference on very large data bases (VLDB). 2006. pp. 763–774. New York:ACM Press. VLDB Endowment
-
(2006)
The new casper: query processing for location services without compromising privacy
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
23
-
-
0035517699
-
Protecting respondents’ identities in microdata release
-
Samarati, P. 2001. Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13 (6):1010–1027.
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
26
-
-
33749571958
-
-
Proc. of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, New York: ACM Press
-
Wong, RC-W, Li, J, Fu, AW-C, and Wang, K. 2006. k-anonymity:an enhanced k-anonymity model for privacy preserving data publishing. Proc. of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. 2006. pp. 754–759. New York:ACM Press.
-
(2006)
k-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
, pp. 754-759
-
-
Wong, R.C.-W.1
Li, J.2
Fu, A.W.-C.3
Wang, K.4
-
27
-
-
34250680246
-
-
SIGMOD ‘06: Proceedings of the 2006 ACM SIGMOD international conference on management of data, New York: ACM Press
-
Xiao, X, and Tao, Y. 2006. Personalized privacy preservation. SIGMOD ‘06:Proceedings of the 2006 ACM SIGMOD international conference on management of data. 2006. pp. 229–240. New York:ACM Press.
-
(2006)
Personalized privacy preservation
, pp. 229-240
-
-
Xiao, X.1
Tao, Y.2
|