Computational disclosure control: a primer on data privacy protection

[1]  Sujeet Shenoi,et al.  Catalytic inference analysis: detecting inference threats due to knowledge discovery , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[2]  Denise Grady,et al.  Hospital files as open book. , 1997, The New York times on the Web.

[3]  Constantin F. Aliferis,et al.  An evaluation of machine-learning methods for predicting pneumonia mortality , 1997, Artif. Intell. Medicine.

[4]  Telecommunications Board For the Record: Protecting Electronic Health Information [link] , 1997 .

[5]  Ton de Waal,et al.  Statistical Disclosure Control in Practice , 1996 .

[6]  C Safran,et al.  Sharing electronic medical records across multiple heterogeneous and competing institutions. , 1996, Proceedings : a conference of the American Medical Informatics Association. AMIA Fall Symposium.

[7]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[8]  Andrew W. Moore,et al.  Efficient Algorithms for Minimizing Cross Validation Error , 1994, ICML.

[9]  L. Gostin,et al.  Privacy and security of personal information in a new health care system. , 1993, JAMA.

[10]  Peter D. Karp,et al.  Detection and elimination of inference channels in multilevel relational database systems , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[11]  Gultekin Özsoyoglu,et al.  Controlling FD and MVD Inferences in Multilevel Relational Database Systems , 1991, IEEE Trans. Knowl. Data Eng..

[12]  George T. Duncan,et al.  Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future , 1991 .

[13]  Mark E. Stickel,et al.  Abductive and approximate reasoning models for characterizing inference channels , 1991, Proceedings Computer Security Foundations Workshop IV.

[14]  George T. Duncan,et al.  Microdata disclosure limitation in statistical databases: query size and random sample query control , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[15]  Gary W. Smith,et al.  Modeling security-relevant data semantics , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[16]  David F. Linowes,et al.  Privacy: The Workplace Issue of the '90s, 23 J. Marshall L. Rev. 591 (1990) , 1990 .

[17]  Teresa F. Lunt Aggregation and inference: facts and fallacies , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[18]  Leoan J. Buczkowski Database Inference Controller , 1989, Database Security.

[19]  Thomas H. Hinke,et al.  Inference aggregation detection in database management systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[20]  Matthew Morgenstern,et al.  Security and inference in multilevel database and knowledge-base systems , 1987, SIGMOD '87.

[21]  Dorothy E. Denning,et al.  A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.

[22]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[23]  Peter J. Denning,et al.  The tracker: a threat to statistical database security , 1979, TODS.

[24]  Jeffrey D. Ullman,et al.  Principles Of Database And Knowledge-Base Systems , 1979 .

[25]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[26]  Ivan P. Fellegi,et al.  On the Question of Statistical Confidentiality , 1972 .

[27]  Peter E. Hart,et al.  Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.