A practice-oriented framework for measuring privacy and utility in data sanitization systems
暂无分享,去创建一个
Reihaneh Safavi-Naini | Jörg Denzinger | Michal Sramka | Mina Askari | R. Safavi-Naini | J. Denzinger | Michal Sramka | Mina Askari
[1] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[2] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[3] Daniel Kifer,et al. Injecting utility into anonymized datasets , 2006, SIGMOD Conference.
[4] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[5] Y. Chen. [The change of serum alpha 1-antitrypsin level in patients with spontaneous pneumothorax]. , 1995, Zhonghua jie he he hu xi za zhi = Zhonghua jiehe he huxi zazhi = Chinese journal of tuberculosis and respiratory diseases.
[6] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[7] Reihaneh Safavi-Naini,et al. Utility of Knowledge Discovered from Sanitized Data , 2008 .
[8] David J. DeWitt,et al. Workload-aware anonymization , 2006, KDD '06.
[9] Kyuseok Shim,et al. Approximate algorithms for K-anonymity , 2007, SIGMOD '07.
[10] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[11] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[12] Ian Witten,et al. Data Mining , 2000 .
[13] Chris Clifton,et al. Multirelational k-Anonymity , 2009, IEEE Trans. Knowl. Data Eng..
[14] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[15] Chris Clifton,et al. Thoughts on k-Anonymization , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[16] Ashwin Machanavajjhala,et al. Worst-Case Background Knowledge for Privacy-Preserving Data Publishing , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[17] Dan Suciu,et al. A formal analysis of information disclosure in data exchange , 2004, SIGMOD '04.
[18] Traian Marius Truta,et al. Protection : p-Sensitive k-Anonymity Property , 2006 .
[19] Vitaly Shmatikov,et al. The cost of privacy: destruction of data-mining utility in anonymized data publishing , 2008, KDD.
[20] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[21] Dan Suciu,et al. The Boundary Between Privacy and Utility in Data Publishing , 2007, VLDB.
[22] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[23] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[24] Elisa Bertino,et al. Efficient k -Anonymization Using Clustering Techniques , 2007, DASFAA.
[25] Reihaneh Safavi-Naini,et al. Utility of Knowledge Extracted from Unsanitized Data when Applied to Sanitized Data , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[26] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[27] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[29] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[30] Reihaneh Safavi-Naini,et al. An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners , 2009, 2009 IEEE International Conference on Data Mining Workshops.
[31] Vijay S. Iyengar,et al. Transforming data to satisfy privacy constraints , 2002, KDD.
[32] Raymond Chi-Wing Wong,et al. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.
[33] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[34] Sushil Jajodia,et al. Secure Data Management in Decentralized Systems , 2014, Secure Data Management in Decentralized Systems.