-
3
-
-
0024914229
-
Security control methods for statistical databases
-
December
-
N. R. Adam and J. C. Wortman. Security control methods for statistical databases. ACM Computer Surveys, 21(4):515–556, December 1989.
-
(1989)
ACM Computer Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortman, J.C.2
-
5
-
-
35348877424
-
Why we search: Visualizing and predicting user behavior
-
E. Adar, D. S. Weld, B. N. Bershad, and S. D. Gribble. Why we search: Visualizing and predicting user behavior. In Proc. of the 16th International Conference on World Wide Web (WWW), pages 161–170, 2007.
-
(2007)
In Proc. of the 16Th International Conference on World Wide Web (WWW)
, pp. 161-170
-
-
Adar, E.1
Weld, D.S.2
Bershad, B.N.3
Gribble, S.D.4
-
6
-
-
33745629638
-
On k-anonymity and the curse of dimensionality
-
Trondheim, Norway
-
C. C. Aggarwal. On k-anonymity and the curse of dimensionality. In Proc. of the 31st Very Large Data Bases (VLDB), pages 901–909, Trondheim, Norway, 2005.
-
(2005)
Proc. of the 31St Very Large Data Bases (VLDB)
, pp. 901-909
-
-
Aggarwal, C.C.1
-
7
-
-
33749553930
-
On privacy preservation against adversarial data mining
-
August
-
C. C. Aggarwal, J. Pei, and B. Zhang. On privacy preservation against adversarial data mining. In Proc. of the 12th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), Philadelphia, PA, August 2006.
-
(2006)
In Proc. of the 12Th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), Philadelphia, PA
-
-
Aggarwal, C.C.1
Pei, J.2
Zhang, B.3
-
9
-
-
42749091916
-
A framework for condensation-based anonymization of string data
-
February
-
C. C. Aggarwal and P. S. Yu. A framework for condensation-based anonymization of string data. Data Mining and Knowledge Discovery (DMKD), 13(3):251–275, February 2008.
-
(2008)
Data Mining and Knowledge Discovery (DMKD)
, vol.13
, Issue.3
, pp. 251-275
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
10
-
-
41549109791
-
On static and dynamic methods for condensation-based privacy-preserving data mining
-
March
-
C. C. Aggarwal and P. S. Yu. On static and dynamic methods for condensation-based privacy-preserving data mining. ACM Transactions on Database Systems (TODS), 33(1), March 2008.
-
(2008)
ACM Transactions on Database Systems (TODS)
, vol.33
, Issue.1
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
12
-
-
77049087087
-
Anonymizing tables
-
Edinburgh, UK, January
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In Proc. of the 10th International Conference on Database Theory (ICDT), pages 246–258, Edinburgh, UK, January 2005.
-
(2005)
Proc. of the 10Th International Conference on Database Theory (ICDT)
, pp. 246-258
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
13
-
-
34250661905
-
Achieving anonymity via clustering
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. In Proc. of the 25th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), Chicago, IL, June 2006.
-
(2006)
In Proc. of the 25Th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), Chicago, IL, June
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
15
-
-
84874154452
-
Snowball: A prototype system for extracting relations from large text collections
-
E. Agichtein, L. Gravano, J. Pavel, V. Sokolova, and A. Voskoboynik. Snowball: A prototype system for extracting relations from large text collections. ACM SIGMOD Record, 30(2):612, 2001.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.2
, pp. 612
-
-
Agichtein, E.1
Gravano, L.2
Pavel, J.3
Sokolova, V.4
Voskoboynik, A.5
-
22
-
-
45749101998
-
Anonymity preserving pattern discovery
-
July
-
M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. Anonymity preserving pattern discovery. International Journal on Very Large Data Bases (VLDBJ), 17(4):703–727, July 2008.
-
(2008)
International Journal on Very Large Data Bases (VLDBJ)
, vol.17
, Issue.4
, pp. 703-727
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
-
23
-
-
48649086112
-
Privacy-aware knowledge discovery from location data
-
May
-
M. Atzori, F. Bonchi, F. Giannotti, D. Pedreschi, and O. Abul. Privacy-aware knowledge discovery from location data. In Proc.oftheInter-national Workshop on Privacy-Aware Location-based Mobile Services (PALMS), pages 283–287, May 2007.
-
(2007)
In Proc.Oftheinter-National Workshop on Privacy-Aware Location-Based Mobile Services (PALMS)
, pp. 283-287
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
Abul, O.5
-
25
-
-
35348848696
-
Wherefore art thou r3579x?
-
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x? Anonymized social networks, hidden patterns and structural steganog-raphy. In Proc. of the International World Wide Web Conference (WWW), Banff, Alberta, May 2007.
-
(2007)
Anonymized Social Networks, Hidden Patterns and Structural Steganog-Raphy. in Proc. of the International World Wide Web Conference (WWW), Banff, Alberta, May
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
26
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
Beijing, China, June
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: A holistic solution to contingency table release. In Proc. of the 26th ACM Symposium on Principles of Database Systems (PODS), pages 273–282, Beijing, China, June 2007.
-
(2007)
Proc. of the 26Th ACM Symposium on Principles of Database Systems (PODS)
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
30
-
-
51849151902
-
Retrieving frequent walks from tracking data in RFID-equipped warehouses
-
May
-
Z. Berenyi and H. Charaf. Retrieving frequent walks from tracking data in RFID-equipped warehouses. In Proc.ofConferenceonHuman System Interactions, pages 663–667, May 2008.
-
(2008)
In Proc.Ofconferenceonhuman System Interactions
, pp. 663-667
-
-
Berenyi, Z.1
Charaf, H.2
-
32
-
-
33244468835
-
Practical privacy: The sulq framework
-
Baltimore, MD, June
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: The sulq framework. In Proc. of the 24th ACM Symposium on Principles of Database Systems (PODS), pages 128–138, Baltimore, MD, June 2005.
-
(2005)
Proc. of the 24Th ACM Symposium on Principles of Database Systems (PODS)
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
33
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
Victoria, Canada
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In Proc. of the 40th annual ACM Symposium on Theory of Computing (STOC), pages 609–618, Victoria, Canada, 2008.
-
(2008)
Proc. of the 40Th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
38
-
-
84856530175
-
Privacypre-serving serial data publishing by role composition
-
August
-
Y. Bu, A.W.C. Fu, R.C.W. Wong, L. Chen, and J. Li. Privacypre-serving serial data publishing by role composition. Proc.oftheVLDB Endowment, 1(1):845–856, August 2008.
-
(2008)
Proc.Ofthevldb Endowment
, vol.1
, Issue.1
, pp. 845-856
-
-
Bu, Y.1
Fu, A.W.C.2
Wong, R.C.W.3
Chen, L.4
Li, J.5
-
39
-
-
28244494064
-
MAFIA: A maximal frequent itemset algorithm
-
D. Burdick, M. Calimlim, J. Flannick, J. Gehrke, and T. Yiu. MAFIA: A maximal frequent itemset algorithm. IEEE Transactions on Knowledge and Data Engineering (TKDE), 17(11):1490–1504, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering (TKDE)
, vol.17
, Issue.11
, pp. 1490-1504
-
-
Burdick, D.1
Calimlim, M.2
Flannick, J.3
Gehrke, J.4
Yiu, T.5
-
40
-
-
0042734800
-
The gene trustee: A universal identification system that ensures privacy and confidentiality for human genetic databases
-
L. Burnett, K. Barlow-Stewart, A. Pros, and H. Aizenberg. The gene trustee: A universal identification system that ensures privacy and confidentiality for human genetic databases. Journal of Law and Medicine, 10:506–513, 2003.
-
(2003)
Journal of Law and Medicine
, vol.10
, pp. 506-513
-
-
Burnett, L.1
Barlow-Stewart, K.2
Pros, A.3
Aizenberg, H.4
-
41
-
-
85060414105
-
-
Business for Social Responsibility. BSR Report on Privacy, 1999. http://www.bsr.org/.
-
(1999)
BSR Report on Privacy
-
-
-
43
-
-
77953937224
-
-
5th edition. Technical report, Office of Statewide Health Planning and Development, July
-
D. M. Carlisle, M. L. Rodrian, and C. L. Diamond. California inpatient data reporting manual, medical information reporting for california, 5th edition. Technical report, Office of Statewide Health Planning and Development, July 2007.
-
(2007)
California Inpatient Data Reporting Manual, Medical Information Reporting for California
-
-
Carlisle, D.M.1
Rodrian, M.L.2
Diamond, C.L.3
-
45
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
46
-
-
24144487020
-
Toward privacy in public databases
-
Cambridge, MA, February
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In Proc. of Theory of Cryptography Conference (TCC), pages 363–385, Cambridge, MA, February 2005.
-
(2005)
Proc. of Theory of Cryptography Conference (TCC)
, pp. 363-385
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
47
-
-
80053281091
-
On privacy-preserving histograms
-
Edinburgh, Scotland, July
-
S. Chawla, C. Dwork, F. McSherry, and K. Talwar. On privacy-preserving histograms. In Proc. of Uncertainty in Artificial Intelligence (UAI), Edinburgh, Scotland, July 2005.
-
(2005)
Proc. of Uncertainty in Artificial Intelligence (UAI)
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Talwar, K.4
-
49
-
-
0034497773
-
Using sample size to limit exposure to data mining
-
C. Clifton. Using sample size to limit exposure to data mining. Journal of Computer Security, 8(4):281–307, 2000.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.4
, pp. 281-307
-
-
Clifton, C.1
-
50
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
December
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu. Tools for privacy preserving distributed data mining. ACM SIGKDD Explorations Newsletter, 4(2):28–34, December 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
51
-
-
39749193831
-
-
Technical Report 22, Office of Management and Budget, December
-
Confidentiality and Data Access Committee. Report on statistical disclosure limitation methodology. Technical Report 22, Office of Management and Budget, December 2005.
-
(2005)
Report on Statistical Disclosure Limitation Methodology
-
-
-
52
-
-
0000082189
-
Suppression methodology and statistical disclosure control
-
June
-
L. H. Cox. Suppression methodology and statistical disclosure control. Journal of the American Statistical Association, 75(370):377–385, June 1980.
-
(1980)
Journal of the American Statistical Association
, vol.75
, Issue.370
, pp. 377-385
-
-
Cox, L.H.1
-
55
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
T. Dalenius. Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15:429–444, 1977.
-
(1977)
Statistik Tidskrift
, vol.15
, pp. 429-444
-
-
Dalenius, T.1
-
56
-
-
0000072558
-
Finding a needle in a haystack-or identifying anonymous census record
-
T. Dalenius. Finding a needle in a haystack-or identifying anonymous census record. Journal of Official Statistics, 2(3):329–336, 1986.
-
(1986)
Journal of Official Statistics
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
58
-
-
0021519434
-
View definition and generalization for database integration in a multidatabase system
-
U. Dayal and H. Y. Hwang. View definition and generalization for database integration in a multidatabase system. IEEE Transactions on Software Engineering (TSE), 10(6):628–645, 1984.
-
(1984)
IEEE Transactions on Software Engineering (TSE)
, vol.10
, Issue.6
, pp. 628-645
-
-
Dayal, U.1
Hwang, H.Y.2
-
59
-
-
0005424036
-
Commutative filters for reducing inference threats in multilevel database systems
-
Oakland, CA, April
-
D. E. Denning. Commutative filters for reducing inference threats in multilevel database systems. In Proc. of the IEEE Symposium on Security and Privacy (S&P), Oakland, CA, April 1985.
-
(1985)
Proc. of the IEEE Symposium on Security and Privacy (S&P)
-
-
Denning, D.E.1
-
61
-
-
84957800033
-
Towards measuring anonymity
-
San Francisco, CA, April
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. In Proc. of the 2nd Internationl Workshop on Privacy Enchancing Technologies (PET), pages 54–68, San Francisco, CA, April 2002.
-
(2002)
Proc. of the 2Nd Internationl Workshop on Privacy Enchancing Technologies (PET)
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
65
-
-
85060423200
-
-
North-Holland, Amsterdam
-
J. Domingo-Ferrer and V. Torra. Theory and Practical Applications for Statistical Agencies, chapter A Quantitative Comparison of Disclosure Control Methods for Microdata, Confidentiality, Disclosure and Data Access, pages 113–134. North-Holland, Amsterdam, 2002.
-
(2002)
Theory and Practical Applications for Statistical Agencies, Chapter a Quantitative Comparison of Disclosure Control Methods for Microdata, Confidentiality, Disclosure and Data Access, Pages 113–134
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
71
-
-
1642302606
-
Building decision tree classifier on private data
-
Japan, December
-
W. Du and Z. Zhan. Building decision tree classifier on private data. In Workshop on Privacy, Security, and Data Mining at the 2002 IEEE International Conference on Data Mining, Maebashi City, Japan, December 2002.
-
Workshop on Privacy, Security, and Data Mining at the 2002 IEEE International Conference on Data Mining, Maebashi City
, pp. 2002
-
-
Du, W.1
Zhan, Z.2
-
73
-
-
0011644131
-
Obtaining information while preserving privacy: A Markov perturbation method for tabular data
-
G. Duncan and S. Fienberg. Obtaining information while preserving privacy: A Markov perturbation method for tabular data. In Statistical Data Protection, pages 351–362, 1998.
-
(1998)
Statistical Data Protection
, pp. 351-362
-
-
Duncan, G.1
Fienberg, S.2
-
74
-
-
33746335051
-
Differential privacy
-
Venice, Italy, July
-
C. Dwork. Differential privacy. In Proc. of the 33rd International Colloquium on Automata, Languages and Programming (ICALP), pages 1–12, Venice, Italy, July 2006.
-
(2006)
Proc. of the 33Rd International Colloquium on Automata, Languages and Programming (ICALP)
, pp. 1-12
-
-
Dwork, C.1
-
75
-
-
70349091568
-
Ask a better question, get a better answer: A new approach to private data analysis
-
Barcelona, Spain, January
-
C. Dwork. Ask a better question, get a better answer: A new approach to private data analysis. In Proc. of the Interntaional Conference on Database Theory (ICDT), pages 18–27, Barcelona, Spain, January 2007.
-
(2007)
Proc. of the Interntaional Conference on Database Theory (ICDT)
, pp. 18-27
-
-
Dwork, C.1
-
77
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
New York, March
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Proc. of the 3rd Theory of Cryptography Conference (TCC), pages 265–284, New York, March 2006.
-
(2006)
Proc. of the 3Rd Theory of Cryptography Conference (TCC)
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
81
-
-
15744373612
-
Randomization in privacy-preserving data mining
-
December
-
A. Evfimievski. Randomization in privacy-preserving data mining. ACM SIGKDD Explorations Newsletter, 4(2):43–48, December 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 43-48
-
-
Evfimievski, A.1
-
82
-
-
57349187196
-
Epistemic privacy
-
Vancouver, Canada
-
A. Evfimievski, R. Fagin, and D. P. Woodruff. Epistemic privacy. In Proc. of the 27th ACM Symposium on Principles of Database Systems (PODS), pages 171–180, Vancouver, Canada, 2008.
-
(2008)
Proc. of the 27Th ACM Symposium on Principles of Database Systems (PODS)
, pp. 171-180
-
-
Evfimievski, A.1
Fagin, R.2
Woodruff, D.P.3
-
84
-
-
0242625281
-
Privacy preserving mining of association rules
-
Edmonton, AB, Canada, July
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In Proc. of 8th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 217–228, Edmonton, AB, Canada, July 2002.
-
(2002)
Proc. of 8Th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD)
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
85
-
-
0034819889
-
Optimal aggregation algorithms for middleware
-
Santa Barbara, CA
-
R. Fagin, Amnon Lotem, and Moni Naor. Optimal aggregation algorithms for middleware. In Proc. of the 20th ACM Symposium on Principles of Database Systems (PODS), pages 102–113, Santa Barbara, CA, 2001.
-
(2001)
Proc. of the 20Th ACM Symposium on Principles of Database Systems (PODS)
, pp. 102-113
-
-
Fagin, R.1
Lotem, A.2
Naor, M.3
-
86
-
-
0033204106
-
On power-law relationships of the internet topology
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. In Proc. of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM), pages 251–262, 1999.
-
(1999)
In Proc. of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM)
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
89
-
-
34548573331
-
Privacy-preserving frequent pattern mining across private databases
-
Houston, TX, November
-
A. W. C. Fu, R. C. W. Wong, and K. Wang. Privacy-preserving frequent pattern mining across private databases. In Proc. of the 5th IEEE International Conference on Data Mining (ICDM), pages 613–616, Houston, TX, November 2005.
-
(2005)
Proc. of the 5Th IEEE International Conference on Data Mining (ICDM)
, pp. 613-616
-
-
Fu, A.W.C.1
Wong, R.C.W.2
Wang, K.3
-
90
-
-
0000983892
-
Masking procedures for microdata disclosure limitation
-
W. A. Fuller. Masking procedures for microdata disclosure limitation. Official Statistics, 9(2):383–406, 1993.
-
(1993)
Official Statistics
, vol.9
, Issue.2
, pp. 383-406
-
-
Fuller, W.A.1
-
91
-
-
72949097416
-
Privacy protection for RFID data
-
Honolulu, HI, March
-
B. C. M. Fung, M. Cao, B. C. Desai, and H. Xu. Privacy protection for RFID data. In Proc. of the 24th ACM SIGAPP Symposium on Applied Computing (SAC), pages 1528–1535, Honolulu, HI, March 2009.
-
(2009)
Proc. of the 24Th ACM SIGAPP Symposium on Applied Computing (SAC)
, pp. 1528-1535
-
-
Fung, B.C.M.1
Cao, M.2
Desai, B.C.3
Xu, H.4
-
92
-
-
77951201056
-
Privacy-preserving data publishing: A survey on recent developments
-
December
-
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey on recent developments. ACM Computing Surveys, 42(4), December 2010.
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
93
-
-
43349106146
-
Anonymity for continuous data publishing
-
Nantes, France, March
-
B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Anonymity for continuous data publishing. In Proc. of the 11th International Conference on Extending Database Technology (EDBT), pages 264–275, Nantes, France, March 2008.
-
(2008)
Proc. of the 11Th International Conference on Extending Database Technology (EDBT)
, pp. 264-275
-
-
Fung, B.C.M.1
Wang, K.2
Fu, A.W.C.3
Pei, J.4
-
94
-
-
64549145427
-
Privacy-preserving data publishing for cluster analysis
-
June
-
B. C. M. Fung, K. Wang, L. Wang, and P. C. K. Hung. Privacy-preserving data publishing for cluster analysis. Data & Knowledge Engineering (DKE), 68(6):552–575, June 2009.
-
(2009)
Data & Knowledge Engineering (DKE)
, vol.68
, Issue.6
, pp. 552-575
-
-
Fung, B.C.M.1
Wang, K.2
Wang, L.3
Hung, P.C.K.4
-
95
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Tokyo, Japan, April
-
B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In Proc. of the 21st IEEE International Conference on Data Engineering (ICDE), pages 05–216, Tokyo, Japan, April 2005.
-
(2005)
Proc. of the 21St IEEE International Conference on Data Engineering (ICDE)
, pp. 05-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
96
-
-
34047165799
-
Anonymizing classification data for privacy preservation
-
May
-
B. C. M. Fung, Ke Wang, and P. S. Yu. Anonymizing classification data for privacy preservation. IEEE Transactions on Knowledge and Data Engineering (TKDE), 19(5):711–725, May 2007.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering (TKDE)
, vol.19
, Issue.5
, pp. 711-725
-
-
Fung, B.C.M.1
Ke, W.2
Yu, P.S.3
-
97
-
-
71749103414
-
An integrated framework for de-identifying heterogeneous data
-
December
-
J. Gardner and L. Xiong. An integrated framework for de-identifying heterogeneous data. Data and Knowledge Engineering (DKE), 68(12):1441–1451, December 2009.
-
(2009)
Data and Knowledge Engineering (DKE)
, vol.68
, Issue.12
, pp. 1441-1451
-
-
Gardner, J.1
Xiong, L.2
-
98
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
January
-
B. Gedik and L. Liu. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing (TMC), 7(1):1–18, January 2008.
-
(2008)
IEEE Transactions on Mobile Computing (TMC)
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
108
-
-
65449131477
-
Researchers yearn to use aol logs, but they hesitate
-
K. Hafner. Researchers yearn to use aol logs, but they hesitate. New York Times, 2006.
-
(2006)
New York Times
-
-
Hafner, K.1
-
110
-
-
70350580145
-
Resisting structural re-identification in anonymized social networks
-
Auckland, New Zealand
-
M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. In Proc. of the Very Large Data Bases (VLDB), Auckland, New Zealand.
-
Proc. of the Very Large Data Bases (VLDB)
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.4
Weis, P.5
-
111
-
-
41849128290
-
-
Technical report, University of Massachusetts Amherst
-
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical report, University of Massachusetts Amherst, 2007.
-
(2007)
Anonymizing Social Networks.
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Weis, P.4
Srivastava, S.5
-
113
-
-
0033334550
-
A parallel solver for generalized additive models
-
M. Hegland, I. Mcintosh, and B. A. Turlach. A parallel solver for generalized additive models. Computational Statistics & Data Analysis, 31(4):377–396, 1999.
-
(1999)
Computational Statistics & Data Analysis
, vol.31
, Issue.4
, pp. 377-396
-
-
Hegland, M.1
McIntosh, I.2
Turlach, B.A.3
-
115
-
-
0023861339
-
Inference aggregation detection in database management systems
-
Oakland, CA, April
-
T. Hinke. Inference aggregation detection in database management systems. In Proc. of the IEEE Symposium on Security and Privacy (S&P), pages 96–107, Oakland, CA, April 1988.
-
(1988)
Proc. of the IEEE Symposium on Security and Privacy (S&P)
, pp. 96-107
-
-
Hinke, T.1
-
117
-
-
33749319132
-
Mix, match, and mutate
-
July
-
R. D. Hof. Mix, match, and mutate. Business Week, July 2005.
-
(2005)
Business Week
-
-
Hof, R.D.1
-
118
-
-
29844458622
-
Deriving private information from randomized data
-
Baltimore, ML
-
Z. Huang, W. Du, and B. Chen. Deriving private information from randomized data. In Proc. of ACM International Conference on Management of Data (SIGMOD), pages 37–48, Baltimore, ML, 2005.
-
(2005)
Proc. of ACM International Conference on Management of Data (SIGMOD)
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
121
-
-
34548668665
-
Privacy preserving clustering on horizontally partitioned data
-
Ali Inan, Selim V. Kaya, Yucel Saygin, Erkay Savas, Ayca A. Hintoglu, and Albert Levi. Privacy preserving clustering on horizontally partitioned data. Data & Knowledge Engineering (DKE), 63(3):646–666, 2007.
-
(2007)
Data & Knowledge Engineering (DKE)
, vol.63
, Issue.3
, pp. 646-666
-
-
Inan, A.1
Kaya, S.V.2
Saygin, Y.3
Savas, E.4
Hintoglu, A.A.5
Levi, A.6
-
123
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Edmonton, AB, Canada, July
-
V. S. Iyengar. Transforming data to satisfy privacy constraints. In Proc. of the 8th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 279–288, Edmonton, AB, Canada, July 2002.
-
(2002)
Proc. of the 8Th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD)
, pp. 279-288
-
-
Iyengar, V.S.1
-
128
-
-
36048997303
-
A secure distributed framework for achieving k-anonymity
-
November
-
W. Jiang and C. Clifton. A secure distributed framework for achieving k-anonymity. Very Large Data Bases Journal (VLDBJ), 15(4):316–333, November 2006.
-
(2006)
Very Large Data Bases Journal (VLDBJ)
, vol.15
, Issue.4
, pp. 316-333
-
-
Jiang, W.1
Clifton, C.2
-
134
-
-
33749540392
-
Privately computing a distributed k-nn classifier
-
Pisa, Italy, September
-
M. Kantarcioglu and C. Clifton. Privately computing a distributed k-nn classifier. In Proc. of the 8th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD), volumeLNCS 3202, pages 279–290, Pisa, Italy, September 2004.
-
(2004)
Proc. of the 8Th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD), Volumelncs 3202
, pp. 279-290
-
-
Kantarcioglu, M.1
Clifton, C.2
-
135
-
-
12244296735
-
When do data mining results violate privacy?
-
Seattle, WA
-
M. Kantarcioglu, J. Jin, and C. Clifton. When do data mining results violate privacy? In Proc. of the 2004 ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 599–604, Seattle, WA, 2004.
-
(2004)
Proc. of the 2004 ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD)
, pp. 599-604
-
-
Kantarcioglu, M.1
Jin, J.2
Clifton, C.3
-
136
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Melbourne, FL
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In Proc. of the 3rd IEEE International Conference on Data Mining (ICDM), pages 99–106, Melbourne, FL, 2003.
-
(2003)
Proc. of the 3Rd IEEE International Conference on Data Mining (ICDM)
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
137
-
-
33244455692
-
Simulatable auditing
-
Baltimore, MD, June
-
K. Kenthapadi, Nina Mishra, and Kobbi Nissim. Simulatable auditing. In Proc. of the 24th ACM Symposium on Principles of Database Systems (PODS), pages 118–127, Baltimore, MD, June 2005.
-
(2005)
Proc. of the 24Th ACM Symposium on Principles of Database Systems (PODS)
, pp. 118-127
-
-
Kenthapadi, K.1
Mishra, N.2
Nissim, K.3
-
146
-
-
35348838459
-
On anonymizing query logs via token-based hashing
-
May
-
R. Kumar, J. Novak, B. Pang, and A. Tomkins. On anonymizing query logs via token-based hashing. In Proc. of the 16th International Conference on World Wide Web (WWW), pages 628–638, May 2007.
-
(2007)
In Proc. of the 16Th International Conference on World Wide Web (WWW)
, pp. 628-638
-
-
Kumar, R.1
Novak, J.2
Pang, B.3
Tomkins, A.4
-
148
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
Baltimore, ML
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In Proc. of ACM International Conference on Management of Data (SIGMOD), pages 49–60, Baltimore, ML, 2005.
-
(2005)
Proc. of ACM International Conference on Management of Data (SIGMOD)
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
149
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE), Atlanta, GA, 2006.
-
(2006)
In Proc. of the 22Nd IEEE International Conference on Data Engineering (ICDE), Atlanta, GA
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
150
-
-
33749568323
-
Workload-aware anonymization
-
Philadelphia, PA, August
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Workload-aware anonymization. In Proc. of the 12th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), Philadelphia, PA, August 2006.
-
(2006)
In Proc. of the 12Th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD)
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
152
-
-
57149132810
-
Preservation of proximity privacy in publishing numerical sensitive data
-
Vancouver, Canada, June
-
J. Li, Y. Tao, and X. Xiao. Preservation of proximity privacy in publishing numerical sensitive data. In Proc. of the ACM International Conference on Management of Data (SIGMOD), pages 437–486, Vancouver, Canada, June 2008.
-
(2008)
In Proc. of the ACM International Conference on Management of Data (SIGMOD)
, pp. 437-486
-
-
Li, J.1
Tao, Y.2
Xiao, X.3
-
153
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and ℓ-diversity
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and ℓ-diversity. In Proc. of the 21st IEEE International Conference on Data Engineering (ICDE), Istanbul, Turkey, April 2007.
-
(2007)
In Proc. of the 21St IEEE International Conference on Data Engineering (ICDE), Istanbul, Turkey, April
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
158
-
-
31344447750
-
Random projection-based multiplicative perturbation for privacy preserving distributed data mining
-
January
-
K. Liu, H. Kargupta, and J. Ryan. Random projection-based multiplicative perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering (TKDE), 18(1):92– 106, January 2006.
-
(2006)
IEEE Transactions on Knowledge and Data Engineering (TKDE)
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
160
-
-
33749607006
-
ℓ-diversity: Privacy beyond k-anonymity
-
Atlanta, GA
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond k-anonymity. In Proc. of the 22nd IEEE International Conference on Data Engineering (ICDE), Atlanta, GA, 2006.
-
(2006)
Proc. of the 22Nd IEEE International Conference on Data Engineering (ICDE)
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
161
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
A. Machanavajjhala, D. Kifer, J. M. Abowd, J. Gehrke, and L. Vilhuber. Privacy: Theory meets practice on the map. In Proc. of the 24th IEEE International Conference on Data Engineering (ICDE), pages 277–286, 2008.
-
(2008)
In Proc. of the 24Th IEEE International Conference on Data Engineering (ICDE)
, pp. 277-286
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.M.3
Gehrke, J.4
Vilhuber, L.5
-
162
-
-
34248181923
-
ℓ-diversity: Privacy beyond k-anonymity
-
March
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1), March 2007.
-
(2007)
ACM Transactions on Knowledge Discovery from Data (TKDD)
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
163
-
-
34548494958
-
The effects of location access behavior on re-identification risk in a distributed environment
-
B. Malin and E. Airoldi. The effects of location access behavior on re-identification risk in a distributed environment. In Proc.of6thWorkshop on Privacy Enhancing Technologies (PET), pages 413–429, 2006.
-
(2006)
In Proc.Of6thworkshop on Privacy Enhancing Technologies (PET)
, pp. 413-429
-
-
Malin, B.1
Airoldi, E.2
-
164
-
-
2942522665
-
How to protect genomic data privacy in a distributed network
-
B. Malin and L. Sweeney. How to protect genomic data privacy in a distributed network. In Journal of Biomed Info, 37(3): 179-192, 2004.
-
(2004)
In Journal of Biomed Info
, vol.37
, Issue.3
, pp. 179-192
-
-
Malin, B.1
Sweeney, L.2
-
165
-
-
34548748619
-
Worst-case background knowledge in privacy-preserving data publishing
-
D. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Halpern. Worst-case background knowledge in privacy-preserving data publishing. In Proc. of the 23rd IEEE International Conference on Data Engineering (ICDE), April 2007.
-
(2007)
In Proc. of the 23Rd IEEE International Conference on Data Engineering (ICDE), April
-
-
Martin, D.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.5
-
166
-
-
33750232780
-
Inference control via query restriction vs. Data modification: A perspective
-
Annapolis, ML
-
N. S. Matloff. Inference control via query restriction vs. data modification: A perspective. In Database Security: Status and Prospects, pages 159–166, Annapolis, ML, 1988.
-
(1988)
Database Security: Status and Prospects
, pp. 159-166
-
-
Matloff, N.S.1
-
170
-
-
74549179664
-
Walking in the crowd: Anonymizing trajectory data for pattern analysis
-
Hong Kong, November
-
N. Mohammed, B. C. M. Fung, and M. Debbabi. Walking in the crowd: Anonymizing trajectory data for pattern analysis. In Proc. of the 18th ACM Conference on Information and Knowledge Management (CIKM), pages 1441–1444, Hong Kong, November 2009.
-
(2009)
Proc. of the 18Th ACM Conference on Information and Knowledge Management (CIKM)
, pp. 1441-1444
-
-
Mohammed, N.1
Fung, B.C.M.2
Debbabi, M.3
-
171
-
-
70350686724
-
Anonymizing healthcare data: A case study on the blood transfusion service
-
Paris, France, June
-
N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. K. Lee. Anonymizing healthcare data: A case study on the blood transfusion service. In Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 1285–1294, Paris, France, June 2009.
-
(2009)
Proc. of the 15Th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)
, pp. 1285-1294
-
-
Mohammed, N.1
Fung, B.C.M.2
Hung, P.C.K.3
Lee, C.K.4
-
176
-
-
35448937300
-
Hiding the presence of individuals from shared databases
-
Vancouver, Canada
-
M. Ercan Nergiz, M. Atzori, and C. W. Clifton. Hiding the presence of individuals from shared databases. In Proc. of ACM International Conference on Management of Data (SIGMOD), pages 665–676, Vancouver, Canada, 2007.
-
(2007)
Proc. of ACM International Conference on Management of Data (SIGMOD)
, pp. 665-676
-
-
Ercan Nergiz, M.1
Atzori, M.2
Clifton, C.W.3
-
178
-
-
34548804367
-
Multirelational k-anonymity
-
Istanbul, Turkey
-
M. Ercan Nergiz, C. Clifton, and A. Erhan Nergiz. Multirelational k-anonymity. In Proc. of the 23rd International Conference on Data Engineering (ICDE), pages 1417–1421, Istanbul, Turkey, 2007.
-
(2007)
Proc. of the 23Rd International Conference on Data Engineering (ICDE)
, pp. 1417-1421
-
-
Ercan Nergiz, M.1
Clifton, C.2
Erhan Nergiz, A.3
-
182
-
-
33846830000
-
A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration
-
S. R. Oliveira and O. R. Zaiane. A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration. Journal on Computers and Security, 26(1):81–93, 2007.
-
(2007)
Journal on Computers and Security
, vol.26
, Issue.1
, pp. 81-93
-
-
Oliveira, S.R.1
Zaiane, O.R.2
-
184
-
-
0025445538
-
On inference control in semantic data models for statistical databases
-
G. Ozsoyoglu and T. Su. On inference control in semantic data models for statistical databases. Journal of Computer and System Sciences, 40(3):405–443, 1990.
-
(1990)
Journal of Computer and System Sciences
, vol.40
, Issue.3
, pp. 405-443
-
-
Ozsoyoglu, G.1
Su, T.2
-
185
-
-
85011095699
-
Time series compressibility and privacy
-
Vienna, Austria, September
-
S. Papadimitriou, F. Li, G. Kollios, and P. S. Yu. Time series compressibility and privacy. In Proc. of the 33rd International Conference on Very Large Data Bases (VLDB), pages 459–470, Vienna, Austria, September 2007.
-
(2007)
Proc. of the 33Rd International Conference on Very Large Data Bases (VLDB)
, pp. 459-470
-
-
Papadimitriou, S.1
Li, F.2
Kollios, G.3
Yu, P.S.4
-
186
-
-
46649101105
-
Maintaining k-anonymity against incremental updates
-
J. Pei, J. Xu, Z. Wang, W. Wang, and K. Wang. Maintaining k-anonymity against incremental updates. In Proc. of the 19th Inter-national Conference on Scientific and Statistical Database Management (SSDBM), Banff, Canada, 2007.
-
(2007)
In Proc. of the 19Th Inter-National Conference on Scientific and Statistical Database Management (SSDBM), Banff, Canada
-
-
Pei, J.1
Xu, J.2
Wang, Z.3
Wang, W.4
Wang, K.5
-
187
-
-
4544312695
-
Cryptographic techniques for privacy-preserving data mining
-
January
-
B. Pinkas. Cryptographic techniques for privacy-preserving data mining. ACM SIGKDD Explorations Newsletter, 4(2):12–19, January 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 12-19
-
-
Pinkas, B.1
-
188
-
-
85060428821
-
-
Springer Berlin / Heidelberg
-
B. Poblete, M. Spiliopoulou, and R. Baeza-Yates. Website privacy preservation for query log publishing. Privacy, Security, and Trust in KDD. Springer Berlin / Heidelberg, 2007.
-
(2007)
Website Privacy Preservation for Query Log Publishing. Privacy, Security, and Trust in KDD
-
-
Poblete, B.1
Spiliopoulou, M.2
Baeza-Yates, R.3
-
189
-
-
84919085619
-
An improved algorithm for computing logarithms over gf(P) and its cryptographic significance
-
IT-24:106–110
-
S. C. Pohlig and M. E. Hellman. An improved algorithm for computing logarithms over gf(p) and its cryptographic significance. IEEE Transactions on Information Theory (TIT), IT-24:106–110, 1978.
-
(1978)
IEEE Transactions on Information Theory (TIT)
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
190
-
-
13844314675
-
-
Technical report, Executive Office of the President of the United States, June
-
President Information Technology Advisory Committee. Revolutionizing health care through information technology. Technical report, Executive Office of the President of the United States, June 2004.
-
(2004)
Revolutionizing Health Care through Information Technology
-
-
-
192
-
-
70350635777
-
Relationship privacy: Output perturbation for queries with joins
-
Rhode Island, USA, July
-
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: Output perturbation for queries with joins. In Proc. of the 28th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), Providence, Rhode Island, USA, July 2009.
-
(2009)
In Proc. of the 28Th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), Providence
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
193
-
-
85011019712
-
The boundary between privacy and utility in data publishing
-
Vienna, Austria, September
-
V. Rastogi, D. Suciu, and S. Hong. The boundary between privacy and utility in data publishing. In Proc. of the 33rd International Conference on Very Large Data Bases (VLDB), pages 531–542, Vienna, Austria, September 2007.
-
(2007)
Proc. of the 33Rd International Conference on Very Large Data Bases (VLDB)
, pp. 531-542
-
-
Rastogi, V.1
Suciu, D.2
Hong, S.3
-
200
-
-
0012776989
-
Discussion statistical disclosure limitation
-
D. B. Rubin. Discussion statistical disclosure limitation. Journal of Official Statistics, 9(2).
-
Journal of Official Statistics
, vol.9
, Issue.2
-
-
Rubin, D.B.1
-
205
-
-
70349230340
-
-
IRM Press
-
Y. Saygin, D. Hakkani-Tur, and G. Tur. Web and Information Security, chapter Sanitization and Anonymization of Document Repositories, pages 133–148. IRM Press, 2006.
-
(2006)
Web and Information Security, Chapter Sanitization and Anonymization of Document Repositories
, pp. 133-148
-
-
Saygin, Y.1
Hakkani-Tur, D.2
Tur, G.3
-
210
-
-
84940644968
-
A mathematical theory of communication
-
623
-
C. E. Shannon. A mathematical theory of communication. The Bell System Technical Journal, 27:379 and 623, 1948.
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 379
-
-
Shannon, C.E.1
-
212
-
-
0020313372
-
Statistical databases: Characteristics, problems and some solutions
-
September
-
A. Shoshani. Statistical databases: Characteristics, problems and some solutions. In Proc. of the 8th Very Large Data Bases (VLDB), pages 208–213, September 1982.
-
(1982)
Proc. of the 8Th Very Large Data Bases (VLDB)
, pp. 208-213
-
-
Shoshani, A.1
-
214
-
-
0030333205
-
Replacing personally-identifying information in medical records, the scrub system
-
L. Sweeney. Replacing personally-identifying information in medical records, the scrub system. In Proc. of the AMIA Annual Fall Symposium, pages 333–337, 1996.
-
(1996)
Proc. of the AMIA Annual Fall Symposium
, pp. 333-337
-
-
Sweeney, L.1
-
216
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness, and Knowledge-based Systems, 10(5):571–588, 2002.
-
(2002)
International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
218
-
-
52649134322
-
On anti-corruption privacy preserving publication
-
April
-
Y. Tao, X. Xiao, J. Li, and D. Zhang. On anti-corruption privacy preserving publication. In Proc. of the 24th IEEE International Conference on Data Engineering (ICDE), pages 725–734, April 2008.
-
(2008)
In Proc. of the 24Th IEEE International Conference on Data Engineering (ICDE)
, pp. 725-734
-
-
Tao, Y.1
Xiao, X.2
Li, J.3
Zhang, D.4
-
220
-
-
84859177489
-
Privacy-preserving anonymization of set-valued data
-
August
-
M. Terrovitis, N. Mamoulis, and P. Kalnis. Privacy-preserving anonymization of set-valued data. Proc. of the VLDB Endowment, 1(1):115–125, August 2008.
-
(2008)
Proc. of the VLDB Endowment
, vol.1
, Issue.1
, pp. 115-125
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
222
-
-
85060425629
-
-
January
-
The RFID Knowledgebase. Oyster transport for London TfL card UK, January 2007. http://www.idtechex.com/knowledgebase/en/cas-estudy.asp?casestudyid=227.
-
(2007)
Oyster Transport for London Tfl Card UK
-
-
-
223
-
-
0038896772
-
Security checking in relational database management systems augmented with inference engines
-
B. M. Thuraisingham. Security checking in relational database management systems augmented with inference engines. Computers and Security, 6:479–492, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 479-492
-
-
Thuraisingham, B.M.1
-
224
-
-
0001504032
-
An experimental study of the small world problem
-
J. Travers and S. Milgram. An experimental study of the small world problem. Sociometry, 32(4):425–443, 1969.
-
(1969)
Sociometry
, vol.32
, Issue.4
, pp. 425-443
-
-
Travers, J.1
Milgram, S.2
-
225
-
-
70449509546
-
Service-oriented architecture for privacy-preserving data mashup
-
Los Angeles, CA, July
-
T. Trojer, B. C. M. Fung, and P. C. K. Hung. Service-oriented architecture for privacy-preserving data mashup. In Proc. of the 7th IEEE International Conference on Web Services (ICWS), pages 767–774, Los Angeles, CA, July 2009.
-
(2009)
Proc. of the 7Th IEEE International Conference on Web Services (ICWS)
, pp. 767-774
-
-
Trojer, T.1
Fung, B.C.M.2
Hung, P.C.K.3
-
228
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Edmonton, AB, Canada
-
J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In Proc. of the 8th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 639–644, Edmonton, AB, Canada, 2002.
-
(2002)
Proc. of the 8Th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD)
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
232
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
March
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. ACM SIGMOD Record, 3(1):50–57, March 2004.
-
(2004)
ACM SIGMOD Record
, vol.3
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
233
-
-
2142754478
-
Association rule hiding
-
V. S. Verykios, A. K. Elmagarmid, A. Bertino, Y. Saygin, and E. Dasseni. Association rule hiding. IEEE Transactions on Knowledge and Data Engineering (TKDE), 16(4):434–447, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering (TKDE)
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, A.3
Saygin, Y.4
Dasseni, E.5
-
235
-
-
34250696941
-
Privacy protection in social network data disclosure based on granular computing
-
Vancouver, BC, July
-
D.-W. Wang, C.-J. Liau, and T.-S. Hsu. Privacy protection in social network data disclosure based on granular computing. In Proc. of IEEE International Conference on Fuzzy Systems, Vancouver, BC, July 2006.
-
(2006)
In Proc. of IEEE International Conference on Fuzzy Systems
-
-
Wang, D.-W.1
Liau, C.-J.2
Hsu, T.-S.3
-
237
-
-
34147125465
-
Handicapping attacker’s confidence: An alternative to k-anonymization
-
April
-
K. Wang, B. C. M. Fung, and P. S. Yu. Handicapping attacker’s confidence: An alternative to k-anonymization. Knowledge and Information Systems (KAIS), 11(3):345–368, April 2007.
-
(2007)
Knowledge and Information Systems (KAIS)
, vol.11
, Issue.3
, pp. 345-368
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
240
-
-
33749658430
-
RFID applications in hospitals: A case study on a demonstration RFID project in a taiwan hospital
-
S.-W. Wang, W.-H. Chen, C.-S. Ong, L. Liu, and Y. W. Chuang. RFID applications in hospitals: a case study on a demonstration RFID project in a taiwan hospital. In Proc. of the 39th Hawaii International Conference on System Sciences, 2006.
-
(2006)
Proc. of the 39Th Hawaii International Conference on System Sciences
-
-
Wang, S.-W.1
Chen, W.-H.2
Ong, C.-S.3
Liu, L.4
Chuang, Y.W.5
-
242
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
S. L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60(309):63–69, 1965.
-
(1965)
Journal of the American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
243
-
-
0003389370
-
The genitor algorithm and selective pressure: Why rank-based allocation of reproductive trials is best
-
D. Whitley. The genitor algorithm and selective pressure: Why rank-based allocation of reproductive trials is best. In Proc. of the 3rd International Conference on Genetic Algorithms, pages 116–121, 1989.
-
(1989)
Proc. of the 3Rd International Conference on Genetic Algorithms
, pp. 116-121
-
-
Whitley, D.1
-
245
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
Vienna, Austria
-
R. C. W. Wong, A. W. C. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In Proc. of the 33rd International Conference on Very Large Data Bases (VLDB), pages 543–554, Vienna, Austria, 2007.
-
(2007)
Proc. of the 33Rd International Conference on Very Large Data Bases (VLDB)
, pp. 543-554
-
-
Wong, R.C.W.1
Fu, A.W.C.2
Wang, K.3
Pei, J.4
-
246
-
-
33749571958
-
α,k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing
-
Philadelphia, PA
-
R. C. W. Wong, J. Li., A. W. C. Fu, and K. Wang. (α,k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In Proc. of the 12th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 754–759, Philadelphia, PA, 2006.
-
(2006)
Proc. of the 12Th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD)
, pp. 754-759
-
-
Wong, R.C.W.1
Li, J.2
Fu, A.W.C.3
Wang, K.4
-
247
-
-
85060417180
-
α,k)-anonymous data publishing
-
press
-
R. C. W. Wong, J. Li., A. W. C. Fu, and K. Wang. (α,k)-anonymous data publishing. Journal of Intelligent Information Systems, in press.
-
Journal of Intelligent Information Systems
-
-
Wong, R.C.W.1
Li, J.2
Fu, A.W.C.3
Wang, K.4
-
254
-
-
33749582207
-
Utility-based anonymization using local recoding
-
Philadelphia, PA, August
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W. C. Fu. Utility-based anonymization using local recoding. In Proc. of the 12th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), Philadelphia, PA, August 2006.
-
(2006)
In Proc. of the 12Th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD)
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.C.6
-
255
-
-
67049167712
-
Publishing sensitive transactions for itemset utility
-
Italy, December
-
Y. Xu, B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Publishing sensitive transactions for itemset utility. In Proc. of the 8th IEEE International Conference on Data Mining (ICDM), Pisa, Italy, December 2008.
-
(2008)
In Proc. of the 8Th IEEE International Conference on Data Mining (ICDM), Pisa
-
-
Xu, Y.1
Fung, B.C.M.2
Wang, K.3
Fu, A.W.C.4
Pei, J.5
-
259
-
-
84880121624
-
Privacy-preserving classification of customer data without loss of accuracy
-
Newport Beach, CA
-
Z. Yang, S. Zhong, and R. N. Wright. Privacy-preserving classification of customer data without loss of accuracy. In Proc.ofthe5thSIAMInternational Conference on Data Mining (SDM), pages 92–102, Newport Beach, CA, 2005.
-
(2005)
Proc.Ofthe5thsiaminternational Conference on Data Mining (SDM)
, pp. 92-102
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
262
-
-
33745599656
-
Checking for k-anonymity violation by views
-
Trondheim, Norway
-
C. Yao, X. S. Wang, and S. Jajodia. Checking for k-anonymity violation by views. In Proc. of the 31st Very Large Data Bases (VLDB), pages 910–921, Trondheim, Norway, 2005.
-
(2005)
Proc. of the 31St Very Large Data Bases (VLDB)
, pp. 910-921
-
-
Yao, C.1
Wang, X.S.2
Jajodia, S.3
-
263
-
-
70349095406
-
Anonymizing moving objects: How to hide a MOB in a crowd?
-
R. Yarovoy, F. Bonchi, L. V. S. Lakshmanan, and W. H. Wang. Anonymizing moving objects: How to hide a MOB in a crowd? In Proc. of the 12th International Conference on Extending Database Technology (EDBT), pages 72–83, 2009.
-
(2009)
In Proc. of the 12Th International Conference on Extending Database Technology (EDBT)
, pp. 72-83
-
-
Yarovoy, R.1
Bonchi, F.2
Lakshmanan, L.V.S.3
Wang, W.H.4
-
267
-
-
85044805019
-
Disclosure avoidance practices and research at the U.S. census bureau: An update
-
L. Zayatz. Disclosure avoidance practices and research at the U.S. census bureau: An update. Journal of Official Statistics, 23(2):253–265, 2007.
-
(2007)
Journal of Official Statistics
, vol.23
, Issue.2
, pp. 253-265
-
-
Zayatz, L.1
-
268
-
-
26944499361
-
Privacy-preserving naive bayes classifier
-
P. Zhang, Y. Tong, S. Tang, and D. Yang. Privacy-preserving naive bayes classifier. Lecture Notes in Computer Science, 3584, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3584
-
-
Zhang, P.1
Tong, Y.2
Tang, S.3
Yang, D.4
-
272
-
-
84865065669
-
K-automorphism: A general framework for privacy preserving network publication
-
L. Zou, L. Chen, and M. T. Özsu. K-automorphism: A general framework for privacy preserving network publication. Proc.oftheVLDB Endowment, 2(1):946–957, 2009
-
(2009)
Proc.Ofthevldb Endowment
, vol.2
, Issue.1
, pp. 946-957
-
-
Zou, L.1
Chen, L.2
Özsu, M.T.3
|