Databases Reference
In-Depth Information
15. Bawa M., Bayardo R. J., Agrawal R.: Privacy-Preserving Indexing of Docu-
ments on the Network.
VLDB Conference
, 2003.
16. Bayardo R. J., Agrawal R.: Data Privacy through Optimal k-Anonymization.
Proceedings of the ICDE Conference
, pp. 217-228, 2005.
17. Bettini C., Wang X. S., Jajodia S.: Protecting Privacy against Location Based
Personal Identification.
Proc. of Secure Data Management Workshop
, Trond-
heim, Norway, 2005.
18. Biskup J., Bonatti P.: Controlled Query Evaluation for Known Policies by Com-
bining Lying and Refusal.
Annals of Mathematics and Artificial Intelligence
,
40(1-2), 2004.
19. Blum A., Dwork C., McSherry F., Nissim K.: Practical Privacy: The SuLQ
Framework.
ACM PODS Conference
, 2005.
20. Chang L., Moskowitz I.: An integrated framwork for database inference and
privacy protection.
Data and Applications Security
. Kluwer, 2000.
21. Chang L., Moskowitz I.: Parsimonious downgrading and decision trees applied
to the inference problem.
New Security Paradigms Workshop
, 1998.
22. Chaum D., Crepeau C., Damgard I.: Multiparty unconditionally secure proto-
cols.
ACM STOC Conference
, 1988.
23.ChawlaS.,DworkC.,McSherryF.,SmithA.,WeeH.:TowardsPrivacyin
Public Databases,
TCC
, 2005.
24. Chawla S., Dwork C., McSherry F., Talwar K.: On the Utility of Privacy-
Preserving Histograms,
UAI
, 2005.
25. Chen K., Liu L.: Privacy-preserving data classification with rotation perturba-
tion.
ICDM Conference
, 2005.
26. Chin F.: Security Problems on Inference Control for SUM, MAX, and MIN
Queries.
J. of the ACM
, 33(3), 1986.
27. Chin F., Ozsoyoglu G.: Auditing for Secure Statistical Databases.
Proceedings
of the ACM'81 Conference
, 1981.
28. Ciriani V., De Capitiani di Vimercati S., Foresti S., Samarati P.:
k
-Anonymity.
Security in Decentralized Data Management
, ed. Jajodia S., Yu T., Springer,
2006.
29. Clifton C., Kantarcioglou M., Lin X., Zhu M.: Tools for privacy-preserving
distributed data mining.
ACM SIGKDD Explorations
, 4(2), 2002.
30. Clifton C., Marks D.: Security and Privacy Implications of Data Mining.,
Work-
shop on Data Mining and Knowledge Discovery
, 1996.
31. Dasseni E., Verykios V., Elmagarmid A., Bertino E.: Hiding Association Rules
using Confidence and Support,
4th Information Hiding Workshop
, 2001.
32. Denning D.: Secure Statostical Databases with Random Sample Queries.
ACM
TODS Journal
, 5(3), 1980.
33. Dinur I., Nissim K.: Revealing Information while preserving privacy.
ACM
PODS Conference
, 2003.
34. Dobkin D., Jones A., Lipton R.: Secure Databases: Protection against User
Influence.
ACM Transactions on Databases Systems
, 4(1), 1979.
35. Domingo-Ferrer J,, Mateo-Sanz J.: Practical data-oriented micro-aggregation
for statistical disclosure control.
IEEE TKDE
, 14(1), 2002.
36. Du W., Atallah M.: Secure Multi-party Computation: A Review and Open
Problems.
CERIAS Tech. Report
2001-51, Purdue University, 2001.
37. Du W., Han Y. S., Chen S.: Privacy-Preserving Multivariate Statistical Anal-
ysis: Linear Regression and Classification, Proc. SIAM Conf. Data Mining,
2004.