Versatile Publishing For Privacy Preservation (Technical Report)
暂无分享,去创建一个
[1] Yufei Tao,et al. Anatomy: simple and effective privacy preservation , 2006, VLDB.
[2] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[3] Vitaly Shmatikov,et al. The cost of privacy: destruction of data-mining utility in anonymized data publishing , 2008, KDD.
[4] Yufei Tao,et al. The hardness and approximation algorithms for l-diversity , 2009, EDBT '10.
[5] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[6] Sushil Jajodia,et al. Information disclosure under realistic assumptions: privacy versus optimality , 2007, CCS '07.
[7] Ramez Elmasri,et al. Fundamentals of Database Systems, 5th Edition , 2006 .
[8] Qing Zhang,et al. Aggregate Query Answering on Anonymized Tables , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[9] Raymond Chi-Wing Wong,et al. Minimality Attack in Privacy Preserving Data Publishing , 2007, VLDB.
[10] Ninghui Li,et al. On the tradeoff between privacy and utility in data publishing , 2009, KDD.
[11] David J. DeWitt,et al. Mondrian Multidimensional K-Anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[12] Xin Jin,et al. Algorithm-safe privacy-preserving data publishing , 2010, EDBT '10.
[13] Chris Clifton,et al. Multirelational k-Anonymity , 2007, IEEE Transactions on Knowledge and Data Engineering.
[14] Panos Kalnis,et al. Fast Data Anonymization with Low Information Loss , 2007, VLDB.
[15] Sushil Jajodia,et al. Checking for k-Anonymity Violation by Views , 2005, VLDB.
[16] Jian Pei,et al. Privacy Preserving Publishing on Multiple Quasi-identifiers , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[17] Lingyu Wang,et al. k-jump strategy for preserving privacy in micro-data disclosure , 2010, ICDT '10.
[18] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[19] Raymond Chi-Wing Wong,et al. FF-Anonymity: When Quasi-identifiers Are Missing , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[20] Raghu Ramakrishnan,et al. Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge , 2007, VLDB.
[21] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[22] Yufei Tao,et al. Preservation of proximity privacy in publishing numerical sensitive data , 2008, SIGMOD Conference.
[23] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[24] Ashwin Machanavajjhala,et al. Worst-Case Background Knowledge for Privacy-Preserving Data Publishing , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[25] Philip S. Yu,et al. Top-down specialization for information and privacy preservation , 2005, 21st International Conference on Data Engineering (ICDE'05).
[26] Minghua Chen,et al. Optimal Random Perturbation at Multiple Privacy Levels , 2009, Proc. VLDB Endow..
[27] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[28] Philip S. Yu,et al. Template-based privacy preservation in classification problems , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[29] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[30] Daniel Kifer,et al. Injecting utility into anonymized datasets , 2006, SIGMOD Conference.
[31] Adam D. Smith,et al. Composition attacks and auxiliary information in data privacy , 2008, KDD.
[32] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[33] Chris Clifton,et al. Hiding the presence of individuals from shared databases , 2007, SIGMOD '07.
[34] Yufei Tao,et al. On Anti-Corruption Privacy Preserving Publication , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[35] David S. Johnson,et al. Computers and In stractability: A Guide to the Theory of NP-Completeness. W. H Freeman, San Fran , 1979 .
[36] Dan Suciu,et al. The Boundary Between Privacy and Utility in Data Publishing , 2007, VLDB.
[37] Raymond Chi-Wing Wong,et al. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.
[38] Ashwin Machanavajjhala,et al. Data Publishing against Realistic Adversaries , 2009, Proc. VLDB Endow..
[39] Daniel Brélaz,et al. New methods to color the vertices of a graph , 1979, CACM.
[40] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.