-
3
-
-
10944251971
-
Data obfuscation: Anonymity and desensitization of usable data sets
-
November-December
-
Bakken, D., Parameswaran, R. and Blough, D. (2004) 'Data obfuscation: anonymity and desensitization of usable data sets', IEEE Security and Privacy, November-December, Vol. 2, No. 6, pp.34-41.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 34-41
-
-
Bakken, D.1
Parameswaran, R.2
Blough, D.3
-
4
-
-
0347432367
-
Information preserving statistical obfuscation
-
Burridge, J. (2003) 'Information preserving statistical obfuscation', Statistics and Computing, pp. 321-327.
-
(2003)
Statistics and Computing
, pp. 321-327
-
-
Burridge, J.1
-
8
-
-
71249121599
-
Empirical disclosure risk assessment of the ipso synthetic generators
-
Domingo-Ferrer, J., Torra, V., Mateo-Sanz, J. and Seb'e, F. (2005) 'Empirical disclosure risk assessment of the ipso synthetic generators', Eurostat Work Session on Statistical Data Confidentiality, pp.227-238.
-
(2005)
Eurostat Work Session on Statistical Data Confidentiality
, pp. 227-238
-
-
Domingo-Ferrer, J.1
Torra, V.2
Mateo-Sanz, J.3
Seb'e, F.4
-
9
-
-
84972531331
-
Data-swapping variation on a theme by Dalenius and Reiss enhancing access to microdata while protecting confidentiality
-
Duncan, G.T. and Pearson, R.W. (1991) 'Data-swapping variation on a theme by Dalenius and Reiss enhancing access to microdata while protecting confidentiality', Prospects for Future Statistical Science Vol. 6, pp.219-232.
-
(1991)
Prospects for Future Statistical Science
, vol.6
, pp. 219-232
-
-
Duncan, G.T.1
Pearson, R.W.2
-
10
-
-
84958048324
-
Data swapping: Balancing privacy against mining of association rules
-
Florence, Italy, August, pp
-
Estivill-Castro, V. and Brankovic, L. (1999) 'Data swapping: Balancing privacy against mining of association rules', Proc. of Knowledge Discovery and Data Warehousing, Florence, Italy, August, pp.389-398.
-
(1999)
Proc. of Knowledge Discovery and Data Warehousing
, pp. 389-398
-
-
Estivill-Castro, V.1
Brankovic, L.2
-
11
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
San Diego, California, June
-
Evfimievski, A., Gehrke, J. and Srikant, R. (2003) 'Limiting privacy breaches in privacy preserving data mining', Principles of Database Systems, San Diego, California, June.
-
(2003)
Principles of Database Systems
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
12
-
-
30444457986
-
Distortion measures for categorical data swapping
-
Technical Report 131, US National Institute for Statistical Sciences, January
-
Gomatam, S. and Karr, A. (2003) 'Distortion measures for categorical data swapping', Technical Report 131, US National Institute for Statistical Sciences, January.
-
(2003)
-
-
Gomatam, S.1
Karr, A.2
-
15
-
-
14244249296
-
Anonymization techniques for knowledge discovery in databases
-
Montreal, Canada, August, pp
-
Klosgen, W. (1995) 'Anonymization techniques for knowledge discovery in databases', Proc. of the First International Conference on Knowledge and Discovery in Data Mining, Montreal, Canada, August, pp.186-191.
-
(1995)
Proc. of the First International Conference on Knowledge and Discovery in Data Mining
, pp. 186-191
-
-
Klosgen, W.1
-
17
-
-
10944249990
-
Controlled data-swapping techniques for masking public use microdata sets
-
96-04, US Bureau of the Census
-
Moore, R. (1996) 'Controlled data-swapping techniques for masking public use microdata sets', SRD Report RR 96-04, US Bureau of the Census.
-
(1996)
SRD Report RR
-
-
Moore, R.1
-
18
-
-
36348942791
-
Chebyshev solution of n+1 linear equations in n unknowns
-
July, pp
-
Moursmund, D. (1965) 'Chebyshev solution of n+1 linear equations in n unknowns', Journal of the ACM, Vol. 12, July, pp.383-387.
-
(1965)
Journal of the ACM
, vol.12
, pp. 383-387
-
-
Moursmund, D.1
-
19
-
-
85086420102
-
Disclosure risk and data utility characteri s tics of data swapping: A preliminary investigation
-
May, pp
-
Muralidhar, K. and Sarathy, R. (2003) 'Disclosure risk and data utility characteri s tics of data swapping: A preliminary investigation', IEEE Security and Privacy, Vol. 1, May, pp. 18-23.
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 18-23
-
-
Muralidhar, K.1
Sarathy, R.2
-
20
-
-
14244260513
-
Privacy preserving clustering by data transformation
-
Manaus, Brazil, October, pp
-
Oliveira, S. and Zaane, O. (2003) 'Privacy preserving clustering by data transformation', Proc. of the 18th Brazilian Symposium on Databases Manaus, Brazil, October, pp.304-318.
-
(2003)
Proc. of the 18th Brazilian Symposium on Databases
, pp. 304-318
-
-
Oliveira, S.1
Zaane, O.2
-
21
-
-
85086419253
-
-
Oliveira, S. and Zaane, O. (2004) 'Achieving privacy preservation when sharing data for clustering', Workshop on Secure Data Management in conjunction with VLDB2004, Toronto, Canada: Springer Verlag, August, LNCS 3178.
-
Oliveira, S. and Zaane, O. (2004) 'Achieving privacy preservation when sharing data for clustering', Workshop on Secure Data Management in conjunction with VLDB2004, Toronto, Canada: Springer Verlag, August, LNCS 3178.
-
-
-
-
22
-
-
44349092333
-
-
Doctoral Thesis, School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA
-
Parameswaran, R. (2006) 'A robust data obfuscation approach for privacy preserving collaborative filtering', Doctoral Thesis, School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, USA.
-
(2006)
A robust data obfuscation approach for privacy preserving collaborative filtering
-
-
Parameswaran, R.1
-
23
-
-
0021389555
-
Practical data-swapping the first steps
-
March, pp
-
Reiss, S.P. (1984) 'Practical data-swapping the first steps', ACM Transactions on Database Systems, Vol. 9, March, pp.20-37.
-
(1984)
ACM Transactions on Database Systems
, vol.9
, pp. 20-37
-
-
Reiss, S.P.1
-
24
-
-
85086419650
-
-
Rivest, R., Adleman, L. and Dertouzas, M. (1978) 'On data banks and privacy homomorphisms', in R.A.D. et al. (Eds.) Foundations of Secure Computations, Academic Press, pp. 169-179.
-
Rivest, R., Adleman, L. and Dertouzas, M. (1978) 'On data banks and privacy homomorphisms', in R.A.D. et al. (Eds.) Foundations of Secure Computations, Academic Press, pp. 169-179.
-
-
-
-
25
-
-
0036811662
-
k-Anonymity: A model for protecting privacy
-
Sweeney, L. (2002) 'k-Anonymity: A model for protecting privacy', International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, Vol. 10, No. 5, pp.557-570.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
26
-
-
0016082639
-
Bibliography on estimation of misclassification
-
July
-
Toussaint, G. (1974) 'Bibliography on estimation of misclassification', IEEE Transactions on Information Theory, July, Vol. 20, No. 4, pp.472-479.
-
(1974)
IEEE Transactions on Information Theory
, vol.20
, Issue.4
, pp. 472-479
-
-
Toussaint, G.1
-
27
-
-
4344650051
-
Using simulated annealing for k-anonymity
-
US Census Bureau
-
Winkler, W. (2002) 'Using simulated annealing for k-anonymity', Research Report Series, US Census Bureau.
-
(2002)
Research Report Series
-
-
Winkler, W.1
|