Databases Reference
In-Depth Information
3. G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas,
and A. Zhu. Anonymizing tables. In International Conference on Database
Theory (ICDT) , pages 246-258, 2005.
4. C. C. Aggrawal. On k-anonymity and the curse of dimensionality. In Interna-
tional Conference on Very Large Data Bases (VLDB) , pages 901-909, 2005.
5. Francois Bancilhon and Nicolas Spyratos. Protection of information in relational
data bases. In International Conference on Very Large Data Bases (VLDB) ,
pages 494-500, 1977.
6. Francois Bancilhon and Nicolas Spyratos. Algebraic versus probabilistic inde-
pendence in data bases. In ACM Symposium on Principles of Database Systems
(PODS) , pages 149-153, 1985.
7. R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization.
In International Conference on Data Engineering (ICDE) , pages 217-228, 2005.
8. Alin Deutsch and Yannis Papakonstantinou. Privacy in database publishing. In
International Conference on Database Theory (ICDT) , pages 230-245, 2005.
9. Alin Deutsch and Val Tannen. Reformulation of XML queries and constraints.
In International Conference on Database Theory (ICDT) , 2003.
10. R. Fagin, P. Kolaitis, R. Miller, and L. Popa. Data exchange: Semantics and
query answering.
In International Conference on Database Theory (ICDT) ,
2003.
11. Alon Halevy.
Answering queries using views: A survey.
VLDB Journal ,
10(4):270-294, 2001.
12. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Ecient full-
domain k-anonymity. In ACM Conference on Management of Data (SIGMOD) ,
pages 49-60, 2005.
13. Maurizio Lenzerini. Data integration: A theoretical perspective. In ACM Sym-
posium on Principles of Database Systems (PODS) , 2002.
14. Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. t-closeness: Pri-
vacy beyond k-anonymity and l-diversity. In International Conference on Data
Engineering (ICDE) , 2007.
15. Ashwin Machanavajjhala and Johannes Gehrke. On the eciency of checking
perfect privacy. In ACM Symposium on Principles of Database Systems (PODS) ,
pages 163-172, 2006.
16. Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakr-
ishnan Venkatasubramaniam. l-diversity: Privacy beyond k-anonymity. In In-
ternational Conference on Data Engineering (ICDE) , page 24, 2006.
17. Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrish-
nan Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. To appear
in IEEE Transactions on Knowledge and Data Engineering (TKDE) .
18. A. Meyerson and R.Williams. On the complexity of optimal k-anonymity. In
ACM Symposium on Principles of Database Systems (PODS) , pages 223-228,
2004.
19. Gerome Miklau and Dan Suciu. A formal analysis of information disclosure in
data exchange. In ACM Conference on Management of Data (SIGMOD) , pages
575-586, 2004.
20. Gerome Miklau and Dan Suciu. A formal analysis of information disclosure
in data exchange. Journal of Computer and Systems Sciences , 73(3):507-534,
2007.
21. Alan Nash and Alin Deutsch. Privacy in GLAV information integration. In
International Conference on Database Theory (ICDT) , pages 89-103, 2007.
Search WWH ::




Custom Search