Databases Reference
In-Depth Information
38. Du W., Atallah M.: Privacy-Preserving Cooperative Statistical Analysis, 17th
Annual Computer Security Applications Conference, 2001.
39. Dwork C., Nissim K.: Privacy-Preserving Data Mining on Vertically Parti-
tioned Databases,
CRYPTO
, 2004.
40. Dwork C., Kenthapadi K., McSherry F., Mironov I., Naor M.: Our Data, Our-
selves: Privacy via Distributed Noise Generation.
EUROCRYPT
, 2006.
41. Dwork C., McSherry F., Nissim K., Smith A.: Calibrating Noise to Sensitivity
in Private Data Analysis,
TCC
, 2006.
42. Even S., Goldreich O., Lempel A.: A Randomized Protocol for Signing Con-
tracts.
Communications of the ACM
, vol 28, 1985.
43. Evfimievski A., Gehrke J., Srikant R. Limiting Privacy Breaches in Privacy
Preserving Data Mining.
ACM PODS Conference
, 2003.
44. Evfimievski A., Srikant R., Agrawal R., Gehrke J.: Privacy-Preserving Mining
of Association Rules.
ACM KDD Conference
, 2002.
45. Fienberg S., McIntyre J.: Data Swapping: Variations on a Theme by Dalenius
and Reiss.
Technical Report, National Institute of Statistical Sciences
, 2003.
46. Fung B., Wang K., Yu P.: Top-Down Specialization for Information and Privacy
Preservation.
ICDE Conference
, 2005.
47. Gambs S., Kegl B., Aimeur E.: Privacy-Preserving Boosting.
Knowledge Dis-
covery and Data Mining Journal
,toappear.
48. Gedik B., Liu L.: A customizable
k
-anonymity model for protecting location
privacy,
ICDCS Conference
, 2005.
49. Goldreich O.: Secure Multi-Party Computation, Unpublished Manuscript,
2002.
50. Huang Z., Du W., Chen B.: Deriving Private Information from Randomized
Data. pp. 37-48,
ACM SIGMOD Conference
, 2005.
51. Hore B., Mehrotra S., Tsudik B.: A Privacy-Preserving Index for Range
Queries.
VLDB Conference
, 2004.
52. Hughes D, Shmatikov V.: Information Hiding, Anonymity, and Privacy: A
modular Approach.
Journal of Computer Security
, 12(1), 3-36, 2004.
53. Inan A., Saygin Y., Savas E., Hintoglu A., Levi A.: Privacy-Preserving Clus-
tering on Horizontally Partitioned Data.
Data Engineering Workshops
, 2006.
54. Ioannidis I., Grama A., Atallah M.: A secure protocol for computing dot prod-
ucts in clustered and distributed environments,
International Conference on
Parallel Processing
, 2002.
55. Iyengar V. S.: Transforming Data to Satisfy Privacy Constraints.
KDD Con-
ference
, 2002.
56. Jiang W., Clifton C.: Privacy-preserving distributed
k
-Anonymity.
Proceedings
of the IFIP 11.3 Working Conference on Data and Applications Security
, 2005.
57. Johnson W., Lindenstrauss J.: Extensions of Lipshitz Mapping into Hilbert
Space,
Contemporary Math.
vol. 26, pp. 189-206, 1984.
58. Jagannathan G., Wright R.: Privacy-Preserving Distributed
k
-means clustering
over arbitrarily partitioned data.
ACM KDD Conference
, 2005.
59. Jagannathan G., Pillaipakkamnatt K., Wright R.: A New Privacy-Preserving
Distributed
k
-Clustering Algorithm.
SIAM Conference on Data Mining
, 2006.
60. Kantarcioglu M., Clifton C.: Privacy-Preserving Distributed Mining of Asso-
ciation Rules on Horizontally Partitioned Data.
IEEE TKDE Journal
, 16(9),
2004.