Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Security of random data perturbation methods
ACM Transactions on Database Systems (TODS)
A General Additive Data Perturbation Method for Database Security
Management Science
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Data modelling versus ontology engineering
ACM SIGMOD Record
CASL: the common algebraic specification language
Theoretical Computer Science
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Description logic programs: combining logic programs with description logic
WWW '03 Proceedings of the 12th international conference on World Wide Web
A framework for privacy preserving classification in data mining
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Jena: implementing the semantic web recommendations
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
Computer Networks: The International Journal of Computer and Telecommunications Networking
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
WETICE '04 Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
The predecessor attack: An analysis of a threat to anonymous communications systems
ACM Transactions on Information and System Security (TISSEC)
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Template-Based Privacy Preservation in Classification Problems
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Blocking Anonymity Threats Raised by Frequent Itemset Mining
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
The devil and packet trace anonymization
ACM SIGCOMM Computer Communication Review
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
(α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Revisiting the uniqueness of simple demographics in the US population
Proceedings of the 5th ACM workshop on Privacy in electronic society
Handicapping attacker's confidence: an alternative to k-anonymization
Knowledge and Information Systems
Some Problems in Sanitizing Network Data
WETICE '06 Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Pellet: A practical OWL-DL reasoner
Web Semantics: Science, Services and Agents on the World Wide Web
Sanitization models and their limitations
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Large-scale collection and sanitization of network security data: risks and challenges
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Adaptive data anonymization against information fusion based privacy attacks on enterprise data
Proceedings of the 2008 ACM symposium on Applied computing
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Robust De-anonymization of Large Sparse Datasets
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Scalable Architecture for Prefix Preserving Anonymization of IP Addresses
SAMOS '08 Proceedings of the 8th international workshop on Embedded Computer Systems: Architectures, Modeling, and Simulation
Web Semantics: Science, Services and Agents on the World Wide Web
CASTLE: A delay-constrained scheme for ks-anonymizing data streams
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Injector: Mining Background Knowledge for Data Anonymization
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
On breaching enterprise data privacy through adversarial information fusion
ICDEW '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering Workshop
SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy
MDMW '08 Proceedings of the 2008 Ninth International Conference on Mobile Data Management Workshops
Privacy aware data sharing: balancing the usability and privacy of datasets
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
IEEE Transactions on Knowledge and Data Engineering
De-anonymizing Social Networks
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Efficient description logic reasoning in prolog: The dlog system
Theory and Practice of Logic Programming
Preserving Privacy in Social Networks: A Structure-Aware Approach
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
An integrated framework for de-identifying unstructured medical data
Data & Knowledge Engineering
Injecting purpose and trust into data anonymisation
Proceedings of the 18th ACM conference on Information and knowledge management
Scalable highly expressive reasoner (SHER)
Web Semantics: Science, Services and Agents on the World Wide Web
The role of network trace anonymization under attack
ACM SIGCOMM Computer Communication Review
Query Answering for OWL-DL with rules
Web Semantics: Science, Services and Agents on the World Wide Web
δ-Presence without Complete World Knowledge
IEEE Transactions on Knowledge and Data Engineering
Privacy aware micro data sanitization
Privacy aware micro data sanitization
Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research
IEEE Security and Privacy
PKDD'05 Proceedings of the 9th European conference on Principles and Practice of Knowledge Discovery in Databases
FaCT++ description logic reasoner: system description
IJCAR'06 Proceedings of the Third international joint conference on Automated Reasoning
Extending the sweetdeal approach for e-procurement using sweetrules and RuleML
RuleML'05 Proceedings of the First international conference on Rules and Rule Markup Languages for the Semantic Web
Low-cost and reliable mutual anonymity protocols in peer-to-peer networks
IEEE Transactions on Parallel and Distributed Systems
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies
Privacy-preserving network flow recording
Digital Investigation: The International Journal of Digital Forensics & Incident Response
All your base are belong to US
Proceedings of the 2012 workshop on New security paradigms
Categorised ethical guidelines for large scale mobile HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Exploiting innocuous activity for correlating users across sites
Proceedings of the 22nd international conference on World Wide Web
Explicit authentication response considered harmful
Proceedings of the 2013 workshop on New security paradigms workshop
Hi-index | 0.00 |
Research in data sanitization (including anonymization) emphasizes ways to prevent an adversary from desanitizing data. Most work focuses on using mathematical mappings to sanitize data. A few papers examine incorporation of privacy requirements, either in the guise of templates or prioritization. Essentially these approaches reduce the information that can be gleaned from a data set. In contrast, this paper considers both the need to ``desanitize'' and the need to support privacy. We consider conflicts between privacy requirements and the needs of analysts examining the redacted data. Our goal is to enable an informed decision about the effects of redacting, and failing to redact data. We begin with relationships among the data being examined, including relationships with a known data set and other, additional, external data. By capturing these relationships, desanitization techniques that exploit them can be identified, and the information that must be concealed in order to thwart them can be determined. Knowing that, a realistic assessment of whether the information and relationships are already widely known or available will enable the sanitizers to assess whether irreversible sanitization is possible, and if so, what to conceal to prevent desanitization.