Databases Reference
In-Depth Information
38. Du W., Atallah M.: Privacy-Preserving Cooperative Statistical Analysis, 17th
Annual Computer Security Applications Conference, 2001.
39. Dwork C., Nissim K.: Privacy-Preserving Data Mining on Vertically Parti-
tioned Databases, CRYPTO , 2004.
40. Dwork C., Kenthapadi K., McSherry F., Mironov I., Naor M.: Our Data, Our-
selves: Privacy via Distributed Noise Generation. EUROCRYPT , 2006.
41. Dwork C., McSherry F., Nissim K., Smith A.: Calibrating Noise to Sensitivity
in Private Data Analysis, TCC , 2006.
42. Even S., Goldreich O., Lempel A.: A Randomized Protocol for Signing Con-
tracts. Communications of the ACM , vol 28, 1985.
43. Evfimievski A., Gehrke J., Srikant R. Limiting Privacy Breaches in Privacy
Preserving Data Mining. ACM PODS Conference , 2003.
44. Evfimievski A., Srikant R., Agrawal R., Gehrke J.: Privacy-Preserving Mining
of Association Rules. ACM KDD Conference , 2002.
45. Fienberg S., McIntyre J.: Data Swapping: Variations on a Theme by Dalenius
and Reiss. Technical Report, National Institute of Statistical Sciences , 2003.
46. Fung B., Wang K., Yu P.: Top-Down Specialization for Information and Privacy
Preservation. ICDE Conference , 2005.
47. Gambs S., Kegl B., Aimeur E.: Privacy-Preserving Boosting. Knowledge Dis-
covery and Data Mining Journal ,toappear.
48. Gedik B., Liu L.: A customizable k -anonymity model for protecting location
privacy, ICDCS Conference , 2005.
49. Goldreich O.: Secure Multi-Party Computation, Unpublished Manuscript,
2002.
50. Huang Z., Du W., Chen B.: Deriving Private Information from Randomized
Data. pp. 37-48, ACM SIGMOD Conference , 2005.
51. Hore B., Mehrotra S., Tsudik B.: A Privacy-Preserving Index for Range
Queries. VLDB Conference , 2004.
52. Hughes D, Shmatikov V.: Information Hiding, Anonymity, and Privacy: A
modular Approach. Journal of Computer Security , 12(1), 3-36, 2004.
53. Inan A., Saygin Y., Savas E., Hintoglu A., Levi A.: Privacy-Preserving Clus-
tering on Horizontally Partitioned Data. Data Engineering Workshops , 2006.
54. Ioannidis I., Grama A., Atallah M.: A secure protocol for computing dot prod-
ucts in clustered and distributed environments, International Conference on
Parallel Processing , 2002.
55. Iyengar V. S.: Transforming Data to Satisfy Privacy Constraints. KDD Con-
ference , 2002.
56. Jiang W., Clifton C.: Privacy-preserving distributed k -Anonymity. Proceedings
of the IFIP 11.3 Working Conference on Data and Applications Security , 2005.
57. Johnson W., Lindenstrauss J.: Extensions of Lipshitz Mapping into Hilbert
Space, Contemporary Math. vol. 26, pp. 189-206, 1984.
58. Jagannathan G., Wright R.: Privacy-Preserving Distributed k -means clustering
over arbitrarily partitioned data. ACM KDD Conference , 2005.
59. Jagannathan G., Pillaipakkamnatt K., Wright R.: A New Privacy-Preserving
Distributed k -Clustering Algorithm. SIAM Conference on Data Mining , 2006.
60. Kantarcioglu M., Clifton C.: Privacy-Preserving Distributed Mining of Asso-
ciation Rules on Horizontally Partitioned Data. IEEE TKDE Journal , 16(9),
2004.
Search WWH ::




Custom Search