-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. Adam and J. Wormian. Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4):515-556, 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.1
Wormian, J.2
-
2
-
-
33746052559
-
Anonymizing tables
-
Edinburgh, Scotland, January
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Anonymizing tables. In Proceedings of the 10th International Conference on Database Theory (ICDT'05), Edinburgh, Scotland, January 2005.
-
(2005)
Proceedings of the 10th International Conference on Database Theory (ICDT'05)
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
3
-
-
33746711412
-
Approximation algorithms for k -anonymity
-
November
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Approximation algorithms for k -anonymity. Journal of Privacy Technology, November 2005.
-
(2005)
Journal of Privacy Technology
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
7
-
-
0001090406
-
Computationally private information retrieval with polylogarithmic communication
-
Prague, Czech Republic, May
-
C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In Proceedings of EUROCRYPT'99, Prague, Czech Republic, May 1999.
-
(1999)
Proceedings of EUROCRYPT'99
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
10
-
-
0032201622
-
Private information retrieval
-
April
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. Journal of ACM, 45(6):965-981, April 1998.
-
(1998)
Journal of ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
11
-
-
85116512957
-
K-anonymity
-
In T. Yu and S. Jajodia, editors, Springer, Berlin, Heidelberg
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati. k-anonymity. In T. Yu and S. Jajodia, editors, Security in Decentralized Data Management. Springer, Berlin, Heidelberg, 2007.
-
(2007)
Security in Decentralized Data Management
-
-
Ciriani, V.1
De Capitani di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
12
-
-
78149348689
-
C -anonymous data mining: Asurvey
-
InC.C.AggarwalandP.S.Yu,editors, Springer-Verlag, New York
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati. c -anonymous data mining: Asurvey.InC.C.AggarwalandP.S.Yu,editors, Privacy-Preserving Data Mining: Models and Algorithms. Springer-Verlag, New York, 2007.
-
(2007)
Privacy-Preserving Data Mining: Models and Algorithms
-
-
Ciriani, V.1
De Capitani di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
13
-
-
84882724877
-
Microdata protection
-
In T. Yu and S. Jajodia, editors, Springer, Berlin, Heidelberg
-
V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati. Microdata protection. In T. Yu and S. Jajodia, editors, Security in Decentralized Data Management. Springer, Berlin, Heidelberg, 2007.
-
(2007)
Security in Decentralized Data Management
-
-
Ciriani, V.1
De Capitani di Vimercati, S.2
Foresti, S.3
Samarati, P.4
-
14
-
-
0001445186
-
A constructive procedure for unbiased controlled rounding
-
L. Cox. A constructive procedure for unbiased controlled rounding. Journal of the American Statistical Association, 82(398):520-524, 1987.
-
(1987)
Journal of the American Statistical Association
, vol.82
, Issue.398
, pp. 520-524
-
-
Cox, L.1
-
15
-
-
3042717763
-
Maximizing sharing of protected information
-
May
-
S. Dawson, S. De Capitani di Vimercati, P. Lincoln, and P. Samarati. Maximizing sharing of protected information. Journal of Computer and System Sciences, 64(3):496-541, May 2002.
-
(2002)
Journal of Computer and System Sciences
, vol.64
, Issue.3
, pp. 496-541
-
-
Dawson, S.1
De Capitani di Vimercati, S.2
Lincoln, P.3
Samarati, P.4
-
16
-
-
84862971597
-
Inference controls
-
Addison-Wesley Publishing Company, Reading, MA
-
D. Denning. Inference controls. In Cryptography and Data Security. Addison-Wesley Publishing Company, Reading, MA, 1982.
-
(1982)
Cryptography and Data Security
-
-
Denning, D.1
-
17
-
-
85084161366
-
Tor: The second-generation onion router
-
San Diego, CA, August
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In Proceedings of the 12th USENIX Security Symposium, San Diego, CA, August 2004.
-
(2004)
Proceedings of the 12th USENIX Security Symposium
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
19
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
Cloudcroft, New Mexico, September
-
W. Du and M. Atallah. Secure multi-party computation problems and their applications: A review and open problems. In Proceedings of the 2001 Workshop on New Security Paradigms, Cloudcroft, New Mexico, September 2001.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms
-
-
Du, W.1
Atallah, M.2
-
20
-
-
0011583645
-
-
Technical report, Los Alamos National Laboratory, Los Alamos, NM, LA-UR-01-6428
-
G. Duncan, S. Keller-McNulty, and S. Stokes. Disclosure risk vs. data utility: The R-U confidentiality map. Technical report, Los Alamos National Laboratory, Los Alamos, NM, 2001. LA-UR-01-6428.
-
(2001)
Disclosure risk vs. data utility: The R-U confidentiality map
-
-
Duncan, G.1
Keller-McNulty, S.2
Stokes, S.3
-
21
-
-
85131608523
-
-
Statistical policy working paper 22, Washington, DC, May Report on Statistical Disclosure Limitation Methodology
-
Federal Committee on Statistical Methodology. Statistical policy working paper 22, Washington, DC, May 1994. Report on Statistical Disclosure Limitation Methodology.
-
(1994)
Federal Committee on Statistical Methodology
-
-
-
25
-
-
0028386368
-
Maximum bounded h-matching is max snp-complete
-
V. Kann. Maximum bounded h-matching is max snp-complete. Information Processing Letters, 49:309-318, 1994.
-
(1994)
Information Processing Letters
, vol.49
, pp. 309-318
-
-
Kann, V.1
-
27
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
Atlanta, GA, April
-
K. LeFevre, D. DeWitt., and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In Proceedings of the International Conference on Data Engineering (ICDE06), Atlanta, GA, April 2006.
-
(2006)
Proceedings of the International Conference on Data Engineering (ICDE06)
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
28
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
Baltimore, MD, June
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In Proceedings of ACM SIGMOD Conference on Management of Data, Baltimore, MD, June 2005.
-
(2005)
Proceedings of ACM SIGMOD Conference on Management of Data
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
29
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
Istanbul, Turkey, April
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the 23nd International Conference on Data Engineering, Istanbul, Turkey, April 2007.
-
(2007)
Proceedings of the 23nd International Conference on Data Engineering
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
30
-
-
33746437508
-
Privacy preserving data mining
-
June
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. Journal of Cryptology, 15(3):177-206, June 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
31
-
-
33749607006
-
L-density: Privacy beyond k-anonymity
-
Atlanta, GA, April
-
A. Machanavajjhala, J. Gehrke, and D. Kifer. l-density: Privacy beyond k-anonymity. In Proceedings of the International Conference on Data Engineering (ICDE06), Atlanta, GA, April 2006.
-
(2006)
Proceedings of the International Conference on Data Engineering (ICDE06)
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
-
34
-
-
0001777423
-
Anonymous Web transactions with crowds
-
February
-
M. Reiter and A. Rubin. Anonymous Web transactions with crowds. Communications of the ACM, 42(2):32-48, February1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 32-48
-
-
Reiter, M.1
Rubin, A.2
-
35
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
November
-
P. Samarati. Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6):1010-1027, November 2001.
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
36
-
-
33947392150
-
A survey on mix networks and their secure applications
-
December
-
K. Sampigethaya and R. Poovendran. A survey on mix networks and their secure applications. Proceedings of the IEEE, 94(12):2142-2181, December 2006.
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.12
, pp. 2142-2181
-
-
Sampigethaya, K.1
Poovendran, R.2
-
38
-
-
0001442046
-
Anonymous connections and onion routing
-
Oakland, CA, May
-
P. Syverson, D. Goldschlag, and M. Reed. Anonymous connections and onion routing. In Proceedings of the 18th Annual Symposium on Security and Privacy, Oakland, CA, May 1997.
-
(1997)
Proceedings of the 18th Annual Symposium on Security and Privacy
-
-
Syverson, P.1
Goldschlag, D.2
Reed, M.3
-
40
-
-
33749571958
-
(a,k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing
-
Philadelphia, PA, August
-
R. C.-W. Wong, J. Li, A. W.-C. Fu, and K. Wang. (a,k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, August 2006.
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Wong, R.C.-W.1
Li, J.2
Fu, A.W.-C.3
Wang, K.4
|