A randomized protocol for signing contracts
Communications of the ACM
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Practical Data-Oriented Microaggregation for Statistical Disclosure Control
IEEE Transactions on Knowledge and Data Engineering
Inference Control in Statistical Databases, From Theory to Practice
Microdata Protection through Noise Addition
Inference Control in Statistical Databases, From Theory to Practice
Sensitive Micro Data Protection Using Latin Hypercube Sampling Technique
Inference Control in Statistical Databases, From Theory to Practice
LHS-Based Hybrid Microdata vs Rank Swapping and Microaggregation for Numeric Microdata Protection
Inference Control in Statistical Databases, From Theory to Practice
Model Based Disclosure Protection
Inference Control in Statistical Databases, From Theory to Practice
Validating Distance-Based Record Linkage with Probabilistic Record Linkage
CCIA '02 Proceedings of the 5th Catalonian Conference on AI: Topics in Artificial Intelligence
Exact and approximate methods for data directed microaggregation in one or more dimensions
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
The use of added error to avoid disclosure in microdata releases
The use of added error to avoid disclosure in microdata releases
Information preserving statistical obfuscation
Statistics and Computing
Secure and private sequence comparisons
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Enabling sovereign information sharing using Web Services
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata
Data Mining and Knowledge Discovery
Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation
Data Mining and Knowledge Discovery
Privacy preserving schema and data matching
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Fairplay—a secure two-party computation system
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Application of Oblivious Transfer Protocol in Distributed Data Mining with Privacy-preserving
ISDPE '07 Proceedings of the The First International Symposium on Data, Privacy, and E-Commerce
Cluster-Specific Information Loss Measures in Data Privacy: A Review
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Privacy homomorphisms for social networks with private relationships
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy-Preserving String Comparisons in Record Linkage Systems: A Review
Information Security Journal: A Global Perspective
Towards the evaluation of time series protection methods
Information Sciences: an International Journal
A Hybrid Approach to Private Record Linkage
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Efficient Private Record Linkage
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy
Transactions on Data Privacy
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
Constrained Microaggregation: Adding Constraints for Data Editing
Transactions on Data Privacy
Secure Multiparty Computation Goes Live
Financial Cryptography and Data Security
A new framework to automate constrained microaggregation
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
Privacy Preserving Record Linkage Using Phonetic Codes
BCI '09 Proceedings of the 2009 Fourth Balkan Conference in Informatics
Valid Statistical Analysis for Logistic Regression with Multiple Sources
Protecting Persons While Protecting the People
Measuring risk and utility of anonymized data using information theory
Proceedings of the 2009 EDBT/ICDT Workshops
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
Privacy-preserving publication of trajectories using microaggregation
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Does differential privacy protect terry gross' privacy?
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Privacy-preserving record linkage
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Towards semantic microaggregation of categorical data for confidential documents
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
Edit constraints on microaggregation and additive noise
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data
Transactions on Data Privacy
Extending microaggregation procedures for time series protection
RSCTC'06 Proceedings of the 5th international conference on Rough Sets and Current Trends in Computing
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Using mahalanobis distance-based record linkage for disclosure risk assessment
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
“Secure” log-linear and logistic regression analysis of distributed databases
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Distributed privacy-preserving methods for statistical disclosure control
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Kd-trees and the real disclosure risks of large statistical databases
Information Fusion
Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios
Information Fusion
Privacy-preserving identity-based broadcast encryption
Information Fusion
Fake injection strategies for private phonetic matching
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Efficient two-party private blocking based on sorted nearest neighborhood clustering
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Hi-index | 0.00 |
In this paper, we review the role of information fusion in data privacy. To that end, we introduce data privacy, and describe how information and data fusion are used in some fields of data privacy. Our study is focused on the use of aggregation for privacy protections, and record linkage techniques.