Modeling and Quality of Masked Microdata
暂无分享,去创建一个
[1] Andrew W. Moore,et al. Cached Sufficient Statistics for Efficient Machine Learning with Large Datasets , 1998, J. Artif. Intell. Res..
[2] John M. Abowd,et al. Multiply-Imputing Confidential Characteristics and File Links in Longitudinal Linked Data , 2004, Privacy in Statistical Databases.
[3] W. Winkler,et al. MASKING MICRODATA FILES , 1995 .
[4] Jay-J. Kim. A METHOD FOR LIMITING DISCLOSURE IN MICRODATA BASED ON RANDOM NOISE AND , 2002 .
[5] William E. Winkler,et al. Methods for evaluating and creating data quality , 2004, Inf. Syst..
[6] Simon D. Woodcock,et al. Disclosure Limitation in Longitudinal Linked Data , 2002 .
[7] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[8] Jerome P. Reiter,et al. Satisfying Disclosure Restrictions With Synthetic Data Sets , 2002 .
[9] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[10] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[11] Jerome P. Reiter,et al. Releasing multiply imputed, synthetic public use microdata: an illustration and empirical study , 2005 .
[12] Art B. Owen,et al. Data Squashing by Empirical Likelihood , 2004, Data Mining and Knowledge Discovery.
[13] Michael Cohen,et al. Sensitive Micro Data Protection Using Latin Hypercube Sampling Technique , 2002, Inference Control in Statistical Databases.
[14] Ruth Brand,et al. Microdata Protection through Noise Addition , 2002, Inference Control in Statistical Databases.
[15] Jerome P. Reiter,et al. Multiple Imputation for Statistical Disclosure Limitation , 2003 .
[16] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[17] Theodore Johnson,et al. Squashing flat files flatter , 1999, KDD '99.
[18] William E. Winkler,et al. Masking and Re-identification Methods for Public-Use Microdata: Overview and Research Problems , 2004, Privacy in Statistical Databases.
[19] Norman S. Matloff,et al. A modified random perturbation method for database security , 1994, TODS.
[20] Josep Domingo-Ferrer,et al. Practical Data-Oriented Microaggregation for Statistical Disclosure Control , 2002, IEEE Trans. Knowl. Data Eng..
[21] William E. Winkler,et al. Single-Ranking Micro-aggregation and Re-identification , 2002 .
[22] William E. Winkler,et al. Disclosure Risk Assessment in Perturbative Microdata Protection , 2002, Inference Control in Statistical Databases.