Databases Reference
In-Depth Information
15. Bawa M., Bayardo R. J., Agrawal R.: Privacy-Preserving Indexing of Docu-
ments on the Network. VLDB Conference , 2003.
16. Bayardo R. J., Agrawal R.: Data Privacy through Optimal k-Anonymization.
Proceedings of the ICDE Conference , pp. 217-228, 2005.
17. Bettini C., Wang X. S., Jajodia S.: Protecting Privacy against Location Based
Personal Identification. Proc. of Secure Data Management Workshop , Trond-
heim, Norway, 2005.
18. Biskup J., Bonatti P.: Controlled Query Evaluation for Known Policies by Com-
bining Lying and Refusal. Annals of Mathematics and Artificial Intelligence ,
40(1-2), 2004.
19. Blum A., Dwork C., McSherry F., Nissim K.: Practical Privacy: The SuLQ
Framework. ACM PODS Conference , 2005.
20. Chang L., Moskowitz I.: An integrated framwork for database inference and
privacy protection. Data and Applications Security . Kluwer, 2000.
21. Chang L., Moskowitz I.: Parsimonious downgrading and decision trees applied
to the inference problem. New Security Paradigms Workshop , 1998.
22. Chaum D., Crepeau C., Damgard I.: Multiparty unconditionally secure proto-
cols. ACM STOC Conference , 1988.
23.ChawlaS.,DworkC.,McSherryF.,SmithA.,WeeH.:TowardsPrivacyin
Public Databases, TCC , 2005.
24. Chawla S., Dwork C., McSherry F., Talwar K.: On the Utility of Privacy-
Preserving Histograms, UAI , 2005.
25. Chen K., Liu L.: Privacy-preserving data classification with rotation perturba-
tion. ICDM Conference , 2005.
26. Chin F.: Security Problems on Inference Control for SUM, MAX, and MIN
Queries. J. of the ACM , 33(3), 1986.
27. Chin F., Ozsoyoglu G.: Auditing for Secure Statistical Databases. Proceedings
of the ACM'81 Conference , 1981.
28. Ciriani V., De Capitiani di Vimercati S., Foresti S., Samarati P.: k -Anonymity.
Security in Decentralized Data Management , ed. Jajodia S., Yu T., Springer,
2006.
29. Clifton C., Kantarcioglou M., Lin X., Zhu M.: Tools for privacy-preserving
distributed data mining. ACM SIGKDD Explorations , 4(2), 2002.
30. Clifton C., Marks D.: Security and Privacy Implications of Data Mining., Work-
shop on Data Mining and Knowledge Discovery , 1996.
31. Dasseni E., Verykios V., Elmagarmid A., Bertino E.: Hiding Association Rules
using Confidence and Support, 4th Information Hiding Workshop , 2001.
32. Denning D.: Secure Statostical Databases with Random Sample Queries. ACM
TODS Journal , 5(3), 1980.
33. Dinur I., Nissim K.: Revealing Information while preserving privacy. ACM
PODS Conference , 2003.
34. Dobkin D., Jones A., Lipton R.: Secure Databases: Protection against User
Influence. ACM Transactions on Databases Systems , 4(1), 1979.
35. Domingo-Ferrer J,, Mateo-Sanz J.: Practical data-oriented micro-aggregation
for statistical disclosure control. IEEE TKDE , 14(1), 2002.
36. Du W., Atallah M.: Secure Multi-party Computation: A Review and Open
Problems. CERIAS Tech. Report 2001-51, Purdue University, 2001.
37. Du W., Han Y. S., Chen S.: Privacy-Preserving Multivariate Statistical Anal-
ysis: Linear Regression and Classification, Proc. SIAM Conf. Data Mining,
2004.
Search WWH ::




Custom Search