-
1
-
-
85136075198
-
An implementable scheme for Secure Delegation of Computing and Data
-
D.-F. J. Domingo-Ferrer and R.X.S. Castillo (1997) An implementable scheme for Secure Delegation of Computing and Data. ICICS 445-451.
-
(1997)
ICICS
, pp. 445-451
-
-
J., D.-F.1
Castillo, R.X.S.2
-
2
-
-
85136019842
-
Privacy reserving mining of association rules
-
SIGKDD
-
E. A. Evfimievski, R. Srikant, A. Agrawal and J. Gehrke (2002) Privacy reserving mining of association rules. SIGKDD
-
(2002)
-
-
A., E.1
Srikant, R.2
Agrawal, A.3
Gehrke, J.4
-
4
-
-
0036361105
-
Executing SQL over Encrypted Data in the Database Service Provider Model
-
Madison, Wisconsin, USA, , June 4–6
-
H. Hacigumus, B. Iyer, C. Li and S. Mehrotra (2002, June 4–6) Executing SQL over Encrypted Data in the Database Service Provider Model. Madison, Wisconsin, USA SIGMOD
-
(2002)
SIGMOD
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
5
-
-
33745623486
-
Efficient Execution of Aggregation Queries over Encypted Relational Databases
-
H. Hacigumus, B. Iyer and S. Mehrotra (2004) Efficient Execution of Aggregation Queries over Encypted Relational Databases. DASFAA 125-136.
-
(2004)
DASFAA
, pp. 125-136
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
-
6
-
-
16644396185
-
Chip-Secured Data Access: Confidential Data on Untrusted Servers
-
L. Bouganim and L. Pucheral (2002) Chip-Secured Data Access: Confidential Data on Untrusted Servers. Proc. of the 28th VLDB Conference
-
(2002)
th VLDB Conference
-
-
Bouganim, L.1
Pucheral, L.2
-
7
-
-
84968422314
-
How to build a Trusted Database System on Unstrusted Storage
-
U. Maheshwari, R. Vingralek and W. Shapiro (2000) How to build a Trusted Database System on Unstrusted Storage. OSDI
-
(2000)
OSDI
-
-
Maheshwari, U.1
Vingralek, R.2
Shapiro, W.3
-
8
-
-
85136029414
-
Querying Encrypted XML document technical report TR-DB-04-03
-
R. Jammalamadaka and S. Mehrotra Querying Encrypted XML document technical report TR-DB-04-03. http://www.db.ics.uci.edu/pages/publications/index.shtml
-
-
-
Jammalamadaka, R.1
Mehrotra, S.2
-
10
-
-
0034827009
-
On the Design and Quantification of Privacy Preserving Data Mining Algorithms
-
D. Agrawal and C.C. Aggarwal (2001) On the Design and Quantification of Privacy Preserving Data Mining Algorithms. PODS
-
(2001)
PODS
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
11
-
-
85136011229
-
A Privacy-Preserving Index for Range Queries technical report TR-DB-04-04
-
B. Hore, S. Mehrotra and G. Tsudik A Privacy-Preserving Index for Range Queries technical report TR-DB-04-04. http://www.db.ics.uci.edu/pages/publications/index.shtml
-
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
12
-
-
85136007877
-
-
Lindell, Y., Pinkas, B. Privacy Preserving Data mining. In Advances in Cryptology-CRYPTO 2000, pp. 36–54.
-
Lindell, Y., Pinkas, B. Privacy Preserving Data mining. In Advances in Cryptology-CRYPTO 2000, pp. 36–54.
-
-
-
-
13
-
-
85136007637
-
Distributed EM clustering without sharing local information
-
Feb
-
x. Lin and C. Clifton (Feb 2003) Distributed EM clustering without sharing local information. Journal of Information sciences
-
(2003)
Journal of Information sciences
-
-
Lin, x.1
Clifton, C.2
-
14
-
-
0003483188
-
Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression
-
SRI International
-
P. Samarati and L. Sweeney (1998) Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression. Technical Report SRI International
-
(1998)
Technical Report
-
-
Samarati, P.1
Sweeney, L.2
-
15
-
-
85135995073
-
-
Meyerson, A., Williams R. General k-anonymization is Hard. Tech-report CMU-CS-03-113.
-
Meyerson, A., Williams R. General k-anonymization is Hard. Tech-report CMU-CS-03-113.
-
-
-
-
16
-
-
0004025372
-
Statistical Disclosure control in Practice
-
Springer-Verlag
-
L. Willenborg and T. De Waal (1996) Statistical Disclosure control in Practice. Springer-Verlag
-
(1996)
-
-
Willenborg, L.1
De Waal, T.2
-
18
-
-
85136028260
-
-
Corel Image Features database, UCI-KDD Archive.
-
Corel Image Features database, UCI-KDD Archive.
-
-
-
-
22
-
-
0021622802
-
The Statistical Security of a Statistical Database
-
J.F. Traub, T. Yemini and H. Wozniakowski (1984) The Statistical Security of a Statistical Database. TODS 672-679.
-
(1984)
TODS
, pp. 672-679
-
-
Traub, J.F.1
Yemini, T.2
Wozniakowski, H.3
-
23
-
-
0020313372
-
Statistical Databases: Characteristics, Problems, and some Solutions
-
A. Shoshani (1982) Statistical Databases: Characteristics, Problems, and some Solutions. VLDB 208-222.
-
(1982)
VLDB
, pp. 208-222
-
-
Shoshani, A.1
-
24
-
-
0346396080
-
Security of Random Data Perturbation Methods
-
K. Muralidhar and R. Sarathy (2000) Security of Random Data Perturbation Methods. TODS 487-493.
-
(2000)
TODS
, pp. 487-493
-
-
Muralidhar, K.1
Sarathy, R.2
-
25
-
-
84982433444
-
A study in protection of statistical databases
-
C.T. Yu and F.Y. Chin (1977) A study in protection of statistical databases. SIGMOD 169-181.
-
(1977)
SIGMOD
, pp. 169-181
-
-
Yu, C.T.1
Chin, F.Y.2
-
26
-
-
85135989044
-
-
Lunt, T. Access control policies for database systems. In Database Security II: Status and prospects, pp. 41–52.
-
Lunt, T. Access control policies for database systems. In Database Security II: Status and prospects, pp. 41–52.
-
-
-
-
27
-
-
85136027636
-
-
Farkas, C., Jajodia, S. The Inference Problem: A Survey. SIGKDD Explorations, Newsletter, Vol 4, 6–11.
-
Farkas, C., Jajodia, S. The Inference Problem: A Survey. SIGKDD Explorations, Newsletter, Vol 4, 6–11.
-
-
-
-
28
-
-
0030681774
-
Catalytic inference analysis: Detecting inference threats due to knowledge discovery
-
Catalytic inference analysis: Detecting inference threats due to knowledge discovery. the IEEE Symposium on security and Privacy 188-199.
-
(1997)
the IEEE Symposium on security and Privacy
, pp. 188-199
-
-
-
29
-
-
85136016002
-
-
Thuraisingham, B. The use of conceptual structures for handling the inference problem. In Database Security V, pp. 333–362.
-
Thuraisingham, B. The use of conceptual structures for handling the inference problem. In Database Security V, pp. 333–362.
-
-
-
-
31
-
-
0034819287
-
Optimal and Approximate Computation of Summary Statistics for Range Aggregates
-
A.C. Gilbert, Y. Kotidis, S. Muthukrishnan and M.J. Strauss (2001) Optimal and Approximate Computation of Summary Statistics for Range Aggregates. PODS 227-236.
-
(2001)
PODS
, pp. 227-236
-
-
Gilbert, A.C.1
Kotidis, Y.2
Muthukrishnan, S.3
Strauss, M.J.4
-
32
-
-
0039253731
-
Approximating Multi-dimensional Aggregate Range Queries over Real Attributes
-
D. Gunopulos, G. Kollios and V.J. Tsotras (2000) Approximating Multi-dimensional Aggregate Range Queries over Real Attributes. ACM-SIMOD 463-474.
-
(2000)
ACM-SIMOD
, pp. 463-474
-
-
Gunopulos, D.1
Kollios, G.2
Tsotras, V.J.3
-
33
-
-
0034826134
-
STHoles: a multi-dimensional workload aware histogram
-
N. Bruno, S. Chaudhuri and L. Gravano (2001) STHoles: a multi-dimensional workload aware histogram. ACM SIGMOD 211-222.
-
(2001)
ACM SIGMOD
, pp. 211-222
-
-
Bruno, N.1
Chaudhuri, S.2
Gravano, L.3
-
34
-
-
85135989430
-
-
Cormen, T., H., Leiserson, C., E., Rivest, R., L. Introduction to Algorithms, MIT Press.
-
Cormen, T., H., Leiserson, C., E., Rivest, R., L. Introduction to Algorithms, MIT Press.
-
-
-
|