Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Security in Databases: A Combinatorial Study
Journal of the ACM (JACM)
Selective Partial Access to a Database
Selective Partial Access to a Database
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Hybrid inferential security methods for statistical databases
ACM SIGAPP Applied Computing Review - Special issue on security
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules
DaWaK '99 Proceedings of the First International Conference on Data Warehousing and Knowledge Discovery
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Journal of Computer and System Sciences - Special issue on PODS 2000
Disclosure risk measures for the sampling disclosure control method
Proceedings of the 2004 ACM symposium on Applied computing
Assessing global disclosure risk in masked microdata
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data
Information Systems Research
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
The boundary between privacy and utility in data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
On static and dynamic methods for condensation-based privacy-preserving data mining
ACM Transactions on Database Systems (TODS)
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Privacy preserving data obfuscation for inherently clustered data
International Journal of Information and Computer Security
Dynamic anonymization: accurate statistical analysis with privacy preservation
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Dynamic inference control in privacy preference enforcement
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
On Distributed k-Anonymization
Fundamenta Informaticae
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
Decision Support Systems
Auditing user queries in dynamic statistical databases
Information Sciences: an International Journal
A cubic-wise balance approach for privacy preservation in data cubes
Information Sciences: an International Journal
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Fuzzy based clustering algorithm for privacy preserving data mining
International Journal of Business Information Systems
Privacy-aware collection of aggregate spatial data
Data & Knowledge Engineering
Testing software in age of data privacy: a balancing act
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering
An improved EDP algorithm to privacy protection in data mining
BI'11 Proceedings of the 2011 international conference on Brain informatics
Temporal context lie detection and generation
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Auditing and inference control for privacy preservation in uncertain environments
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
On Distributed k-Anonymization
Fundamenta Informaticae
Developing privacy solutions for sharing and analysing healthcare data
International Journal of Business Information Systems
Hi-index | 0.00 |
The problem of statistical database confidentiality in releasing microdata is addressed through the use of approximate data-swapping. Here, a portion of the microdata is replaced with a database that has been selected with approximately the same statistics. The result guarantees the confidentiality of the original data, while providing microdata with accurate statistics. Methods for achieving such transformations are considered and analyzed through simulation.