Databases Reference
In-Depth Information
3. G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas,
and A. Zhu. Anonymizing tables. In
International Conference on Database
Theory (ICDT)
, pages 246-258, 2005.
4. C. C. Aggrawal. On k-anonymity and the curse of dimensionality. In
Interna-
tional Conference on Very Large Data Bases (VLDB)
, pages 901-909, 2005.
5. Francois Bancilhon and Nicolas Spyratos. Protection of information in relational
data bases. In
International Conference on Very Large Data Bases (VLDB)
,
pages 494-500, 1977.
6. Francois Bancilhon and Nicolas Spyratos. Algebraic versus probabilistic inde-
pendence in data bases. In
ACM Symposium on Principles of Database Systems
(PODS)
, pages 149-153, 1985.
7. R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization.
In
International Conference on Data Engineering (ICDE)
, pages 217-228, 2005.
8. Alin Deutsch and Yannis Papakonstantinou. Privacy in database publishing. In
International Conference on Database Theory (ICDT)
, pages 230-245, 2005.
9. Alin Deutsch and Val Tannen. Reformulation of XML queries and constraints.
In
International Conference on Database Theory (ICDT)
, 2003.
10. R. Fagin, P. Kolaitis, R. Miller, and L. Popa. Data exchange: Semantics and
query answering.
In
International Conference on Database Theory (ICDT)
,
2003.
11. Alon Halevy.
Answering queries using views: A survey.
VLDB Journal
,
10(4):270-294, 2001.
12. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Ecient full-
domain k-anonymity. In
ACM Conference on Management of Data (SIGMOD)
,
pages 49-60, 2005.
13. Maurizio Lenzerini. Data integration: A theoretical perspective. In
ACM Sym-
posium on Principles of Database Systems (PODS)
, 2002.
14. Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. t-closeness: Pri-
vacy beyond k-anonymity and l-diversity. In
International Conference on Data
Engineering (ICDE)
, 2007.
15. Ashwin Machanavajjhala and Johannes Gehrke. On the eciency of checking
perfect privacy. In
ACM Symposium on Principles of Database Systems (PODS)
,
pages 163-172, 2006.
16. Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakr-
ishnan Venkatasubramaniam. l-diversity: Privacy beyond k-anonymity. In
In-
ternational Conference on Data Engineering (ICDE)
, page 24, 2006.
17. Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrish-
nan Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity.
To appear
in IEEE Transactions on Knowledge and Data Engineering (TKDE)
.
18. A. Meyerson and R.Williams. On the complexity of optimal k-anonymity. In
ACM Symposium on Principles of Database Systems (PODS)
, pages 223-228,
2004.
19. Gerome Miklau and Dan Suciu. A formal analysis of information disclosure in
data exchange. In
ACM Conference on Management of Data (SIGMOD)
, pages
575-586, 2004.
20. Gerome Miklau and Dan Suciu. A formal analysis of information disclosure
in data exchange.
Journal of Computer and Systems Sciences
, 73(3):507-534,
2007.
21. Alan Nash and Alin Deutsch. Privacy in GLAV information integration. In
International Conference on Database Theory (ICDT)
, pages 89-103, 2007.