Privacy Protection with Uncertainty and Indistinguishability
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Indistinguishability: The Other Aspect of Privacy , 2006, Secure Data Management.
[2] Raymond Chi-Wing Wong,et al. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.
[3] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[4] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[5] Nina Mishra,et al. Simulatable auditing , 2005, PODS.
[6] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[7] Hoeteck Wee,et al. Toward Privacy in Public Databases , 2005, TCC.
[8] Alberto O. Mendelzon,et al. Authorization Views and Conditional Query Containment , 2005, ICDT.
[9] Alin Deutsch,et al. Privacy in Database Publishing , 2005, ICDT.
[10] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[11] Chris Clifton,et al. When do data mining results violate privacy? , 2004, KDD.
[12] Shipra Agrawal,et al. FRAPP: a framework for high-accuracy privacy-preserving mining , 2004, 21st International Conference on Data Engineering (ICDE'05).
[13] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[14] Dan Suciu,et al. A formal analysis of information disclosure in data exchange , 2004, SIGMOD '04.
[15] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[16] Sushil Jajodia,et al. Cardinality-Based Inference Control in Sum-Only Data Cubes , 2002, ESORICS.
[17] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[18] Jayant R. Haritsa,et al. Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.
[19] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[20] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[21] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[22] Sushil Jajodia,et al. Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures , 2000, IEEE Trans. Knowl. Data Eng..
[23] Jon M. Kleinberg,et al. Auditing Boolean attributes , 2000, PODS.
[24] Harry S. Delugach,et al. Wizard: A Database Inference Analysis and Detection System , 1996, IEEE Trans. Knowl. Data Eng..
[25] D.G. Marks,et al. Inference in MLS Database Systems , 1996, IEEE Trans. Knowl. Data Eng..
[26] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, CSUR.