Security and inference in multilevel database and knowledge-base systems
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
Principles of database and knowledge-base systems, Vol. I
Principles of database and knowledge-base systems, Vol. I
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Cryptography and data security
Cryptography and data security
Controlling FD and MVD Inferences in Multilevel Relational Database Systems
IEEE Transactions on Knowledge and Data Engineering
Detection and Elimination of Inference Channels in Multilevel Relational Database Systems
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
k-anonymous message transmission
Proceedings of the 10th ACM conference on Computer and communications security
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
A formal analysis of information disclosure in data exchange
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
k-TTP: a new privacy model for large-scale distributed environments
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
An identifiability-based access control model for privacy protection in open systems
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
k-anonymous secret handshakes with reusable credentials
Proceedings of the 11th ACM conference on Computer and communications security
Data Obfuscation: Anonymity and Desensitization of Usable Data Sets
IEEE Security and Privacy
Preserving Privacy by De-Identifying Face Images
IEEE Transactions on Knowledge and Data Engineering
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
To do or not to do: the dilemma of disclosing anonymized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol
IEEE Transactions on Mobile Computing
Anonymity-preserving data collection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Protecting privacy in tabular healthcare data: explicit uncertainty for disclosure control
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
IEEE Transactions on Knowledge and Data Engineering
Blocking Anonymity Threats Raised by Frequent Itemset Mining
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
IEEE Transactions on Dependable and Secure Computing
ACM SIGKDD Explorations Newsletter
Towards low-perturbation anonymity preserving pattern discovery
Proceedings of the 2006 ACM symposium on Applied computing
Privacy via pseudorandom sketches
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Achieving anonymity via clustering
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
On the efficiency of checking perfect privacy
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Injecting utility into anonymized datasets
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
A crossover operator for the k- anonymity problem
Proceedings of the 8th annual conference on Genetic and evolutionary computation
You are what you say: privacy risks of public mentions
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
Efficient anonymity-preserving data collection
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing sequential releases
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Utility-based anonymization using local recoding
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
A reconstruction-based algorithm for classification rules hiding
ADC '06 Proceedings of the 17th Australasian Database Conference - Volume 49
Efficient multivariate data-oriented microaggregation
The VLDB Journal — The International Journal on Very Large Data Bases
A secure distributed framework for achieving k-anonymity
The VLDB Journal — The International Journal on Very Large Data Bases
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Proceedings of the second ACM workshop on Digital identity management
On the effectiveness of k;-anonymity against traffic analysis and surveillance
Proceedings of the 5th ACM workshop on Privacy in electronic society
Revisiting the uniqueness of simple demographics in the US population
Proceedings of the 5th ACM workshop on Privacy in electronic society
Achieving privacy in mesh networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
How to win the clonewars: efficient periodic n-times anonymous authentication
Proceedings of the 13th ACM conference on Computer and communications security
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Countering Terrorism through Information and Privacy Protection Technologies
IEEE Security and Privacy
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
A formal analysis of information disclosure in data exchange
Journal of Computer and System Sciences
An epistemic framework for privacy protection in database linking
Data & Knowledge Engineering
Privacy-preserving collaborative association rule mining
Journal of Network and Computer Applications
Utility-based anonymization for privacy preservation with less information loss
ACM SIGKDD Explorations Newsletter
Proceedings of the 16th international conference on World Wide Web
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
Privacy-enhancing personalized web search
Proceedings of the 16th international conference on World Wide Web
K-anonymization incremental maintenance and optimization techniques
Proceedings of the 2007 ACM symposium on Applied computing
Approximate algorithms for K-anonymity
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Hiding the presence of individuals from shared databases
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
GhostDB: querying visible and hidden data without leaks
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Range search on multidimensional uncertain data
ACM Transactions on Database Systems (TODS)
Privacy protection in personalized search
ACM SIGIR Forum
Privacy-preserving distributed association rule mining via semi-trusted mixer
Data & Knowledge Engineering
A computational model to protect patient data from location-based re-identification
Artificial Intelligence in Medicine
Sanitization models and their limitations
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
TFRP: An efficient microaggregation algorithm for statistical disclosure control
Journal of Systems and Software
Editorial: Some issues in privacy data management
Data & Knowledge Engineering
Enabling access-privacy for random walk based data analysis applications
Data & Knowledge Engineering
Private distributed collaborative filtering using estimated concordance measures
Proceedings of the 2007 ACM conference on Recommender systems
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
Security and Privacy in Pervasive Computing
IEEE Pervasive Computing
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Linkability estimation between subjects and message contents using formal concepts
Proceedings of the 2007 ACM workshop on Digital identity management
Information disclosure under realistic assumptions: privacy versus optimality
Proceedings of the 14th ACM conference on Computer and communications security
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
k-Unlinkability: A privacy protection model for distributed data
Data & Knowledge Engineering
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Time series compressibility and privacy
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
The boundary between privacy and utility in data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Minimality attack in privacy preserving data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
K-anonymization as spatial indexing: toward scalable and incremental anonymization
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Fast data anonymization with low information loss
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Privacy skyline: privacy with multidimensional adversarial knowledge
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
GhostDB: hiding data from prying eyes
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
A polynomial-time approximation to optimal multivariate microaggregation
Computers & Mathematics with Applications
Statistical disclosure control architectures for patient records in biomedical information systems
Journal of Biomedical Informatics
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Better bug reporting with better privacy
Proceedings of the 13th international conference on Architectural support for programming languages and operating systems
Towards optimal k-anonymization
Data & Knowledge Engineering
Communications of the ACM - Organic user interfaces
Anonymity protocols as noisy channels
Information and Computation
Anonymity for continuous data publishing
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
A TTP-free protocol for location privacy in location-based services
Computer Communications
A unified framework for protecting sensitive association rules in business collaboration
International Journal of Business Intelligence and Data Mining
Extended RBAC-based design and implementation for a secure data warehouse
International Journal of Business Intelligence and Data Mining
Privacy preserving data obfuscation for inherently clustered data
International Journal of Information and Computer Security
Detection and surveillance technologies: privacy-related requirements and protection schemes
International Journal of Electronic Security and Digital Forensics
Can Ferris Bueller still have his day off? protecting privacy in the wireless era
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Challenges and architectural approaches for authenticating mobile users
Proceedings of the 1st international workshop on Software architectures and mobility
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Dynamic anonymization: accurate statistical analysis with privacy preservation
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Data reduction approach for sensitive associative classification rule hiding
ADC '08 Proceedings of the nineteenth conference on Australasian database - Volume 75
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
An efficient clustering method for k-anonymization
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
A three-layered model to implement data privacy policies
Computer Standards & Interfaces
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Workload-aware anonymization techniques for large-scale datasets
ACM Transactions on Database Systems (TODS)
Characterizing privacy in online social networks
Proceedings of the first workshop on Online social networks
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Composition attacks and auxiliary information in data privacy
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
A survey of query log privacy-enhancing techniques from a policy perspective
ACM Transactions on the Web (TWEB)
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge
ACM Transactions on Knowledge Discovery from Data (TKDD)
A collection of privacy design patterns
Proceedings of the 2006 conference on Pattern languages of programs
Anonymisation of Swedish Clinical Data
AIME '07 Proceedings of the 11th conference on Artificial Intelligence in Medicine
A k-Anonymity Clustering Method for Effective Data Privacy Preservation
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites
SSDBM '08 Proceedings of the 20th international conference on Scientific and Statistical Database Management
A Probabilistic Framework for Building Privacy-Preserving Synopses of Multi-dimensional Data
SSDBM '08 Proceedings of the 20th international conference on Scientific and Statistical Database Management
An Empirical Study of Utility Measures for k-Anonymisation
BNCOD '08 Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Protecting the Publishing Identity in Multiple Tuples
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Data Quality in Privacy Preservation for Associative Classification
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
How Anonymous Is k-Anonymous? Look at Your Quasi-ID
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
BSGI: An Effective Algorithm towards Stronger l-Diversity
DEXA '08 Proceedings of the 19th international conference on Database and Expert Systems Applications
A Robust Sampling-Based Framework for Privacy Preserving OLAP
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Spatial generalisation algorithms for LBS privacy preservation
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Resisting structural re-identification in anonymized social networks
Proceedings of the VLDB Endowment
Privacy-preserving anonymization of set-valued data
Proceedings of the VLDB Endowment
Anonymizing bipartite graph data using safe groupings
Proceedings of the VLDB Endowment
Privacy preserving serial data publishing by role composition
Proceedings of the VLDB Endowment
On the disclosure risk of multivariate microaggregation
Data & Knowledge Engineering
Does enforcing anonymity mean decreasing data usefulness?
Proceedings of the 4th ACM workshop on Quality of protection
Yet another privacy metric for publishing micro-data
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Privacy-safe network trace sharing via secure queries
Proceedings of the 1st ACM workshop on Network data anonymization
The risk-utility tradeoff for IP address truncation
Proceedings of the 1st ACM workshop on Network data anonymization
A survey of state-of-the-art in anonymity metrics
Proceedings of the 1st ACM workshop on Network data anonymization
Efficient techniques for document sanitization
Proceedings of the 17th ACM conference on Information and knowledge management
Data degradation: making private data less sensitive over time
Proceedings of the 17th ACM conference on Information and knowledge management
Towards privacy-preserving integration of distributed heterogeneous data
Proceedings of the 2nd PhD workshop on Information and knowledge management
Situation-Based Access Control: Privacy management via modeling of patient data access scenarios
Journal of Biomedical Informatics
BitBlender: light-weight anonymity for BitTorrent
Proceedings of the workshop on Applications of private and anonymous communications
Sharescape: an interface for place annotation
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
Privacy: preserving trajectory collection
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
A maximum entropy approach to feature selection in knowledge-based authentication
Decision Support Systems
Information Leakage in Optimal Anonymized and Diversified Data
Information Hiding
A Privacy-Protecting Business-Analytics Service for On-Line Transactions
International Journal of Electronic Commerce
Beyond User-to-User Access Control for Online Social Networks
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
IDEAL '08 Proceedings of the 9th International Conference on Intelligent Data Engineering and Automated Learning
Improving Microaggregation for Complex Record Anonymization
MDAI '08 Sabadell Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence
L-Diversity Based Dynamic Update for Large Time-Evolving Microdata
AI '08 Proceedings of the 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
A Heuristic Data Reduction Approach for Associative Classification Rule Hiding
PRICAI '08 Proceedings of the 10th Pacific Rim International Conference on Artificial Intelligence: Trends in Artificial Intelligence
A Novel Heuristic Algorithm for Privacy Preserving of Associative Classification
PRICAI '08 Proceedings of the 10th Pacific Rim International Conference on Artificial Intelligence: Trends in Artificial Intelligence
Facilitating discovery on the private web using dataset digests
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Understanding the privacy-efficiency trade-off in location based queries
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Towards trajectory anonymization: a generalization-based approach
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Teaching database security and auditing
Proceedings of the 40th ACM technical symposium on Computer science education
Realtime location privacy via mobility prediction: creating confusion at crossroads
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Experimenting in mobile social contexts using JellyNets
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
A network aware privacy model for online requests in trajectory data
Data & Knowledge Engineering
On the comparison of microdata disclosure control algorithms
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Detecting privacy violations in database publishing using disjoint queries
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Continuous privacy preserving publishing of data streams
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
HIDE: heterogeneous information DE-identification
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy-preserving incremental data dissemination
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Evaluating privacy threats in released database views by symmetric indistinguishability
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Information disclosure by answers to XPath queries
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Finding lists of people on the web
ACM SIGCAS Computers and Society
Importance partitioning in micro-aggregation
Computational Statistics & Data Analysis
Towards the evaluation of time series protection methods
Information Sciences: an International Journal
Distributed and Parallel Databases
Adversarial-knowledge dimensions in data privacy
The VLDB Journal — The International Journal on Very Large Data Bases
Genetic algorithm-based clustering approach for k-anonymization
Expert Systems with Applications: An International Journal
Privacy preserving churn prediction
Proceedings of the 2009 ACM symposium on Applied Computing
Improving stream correlation attacks on anonymous networks
Proceedings of the 2009 ACM symposium on Applied Computing
Privately detecting bursts in streaming, distributed time series data
Data & Knowledge Engineering
Privacy-preserving data publishing for cluster analysis
Data & Knowledge Engineering
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
The union-split algorithm and cluster-based anonymization of social networks
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Confidentiality-preserving distributed proofs of conjunctive queries
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Security deciding in publishing views based on entropy
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Anonymization-based attacks in privacy-preserving data publishing
ACM Transactions on Database Systems (TODS)
A framework for efficient data anonymization under privacy and accuracy constraints
ACM Transactions on Database Systems (TODS)
A brief survey on anonymization techniques for privacy preserving publishing of social network data
ACM SIGKDD Explorations Newsletter
Privacy policy enforcement for health information data access
Proceedings of the 1st ACM international workshop on Medical-grade wireless networks
A tree-based approach to preserve the privacy of software engineering data and predictive models
PROMISE '09 Proceedings of the 5th International Conference on Predictor Models in Software Engineering
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy
Transactions on Data Privacy
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
Statistical Disclosure Control for Microdata Using the R-Package sdcMicro
Transactions on Data Privacy
Constrained Microaggregation: Adding Constraints for Data Editing
Transactions on Data Privacy
On the tradeoff between privacy and utility in data publishing
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially private recommender systems: building privacy into the net
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing healthcare data: a case study on the blood transfusion service
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing location-based RFID data
C3S2E '09 Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering
Information Sciences: an International Journal
Attacks on privacy and deFinetti's theorem
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Secure kNN computation on encrypted databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Privacy preservation of aggregates in hidden databases: why and how?
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Anonymized data: generation, models, usage
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
On the Anonymity of Home/Work Location Pairs
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Location Diversity: Enhanced Privacy Protection in Location Based Services
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
Geocode Matching and Privacy Preservation
Privacy, Security, and Trust in KDD
Data and Structural k-Anonymity in Social Networks
Privacy, Security, and Trust in KDD
A mobility camouflaging evaluation tool
Proceedings of the 47th Annual Southeast Regional Conference
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
Privacy-Preserving Query Answering in Logic-based Information Systems
Proceedings of the 2008 conference on ECAI 2008: 18th European Conference on Artificial Intelligence
Masking Gateway for Enterprises
Languages: From Formal to Natural
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
Sanitization's slippery slope: the design and study of a text revision assistant
Proceedings of the 5th Symposium on Usable Privacy and Security
Clustering-Based Frequency l-Diversity Anonymization
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
On Distributed k-Anonymization
Fundamenta Informaticae
BNCOD 26 Proceedings of the 26th British National Conference on Databases: Dataspace: The Final Frontier
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
International Journal of Data Analysis Techniques and Strategies
RSFDGrC '07 Proceedings of the 11th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing
Privacy aware data sharing: balancing the usability and privacy of datasets
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Privacy risks in health databases from aggregate disclosure
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Social networks integration and privacy preservation using subgraph generalization
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
ICDM '09 Proceedings of the 9th Industrial Conference on Advances in Data Mining. Applications and Theoretical Aspects
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications
Journal of Systems and Software
(α, k)-anonymous data publishing
Journal of Intelligent Information Systems
Hiding stars with fireworks: location privacy through camouflage
Proceedings of the 15th annual international conference on Mobile computing and networking
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Nearest Neighbor Tour Circuit Encryption Algorithm Based Random Isomap Reduction
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Reconstructing Data Perturbed by Random Projections When the Mixing Matrix Is Known
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
ADHOC-NOW '09 Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks
L-Cover: Preserving Diversity by Anonymity
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
A utility-theoretic approach to privacy and personalization
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
Privately querying location-based services with SybilQuery
Proceedings of the 11th international conference on Ubiquitous computing
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
PAD: privacy-area aware, dummy-based location privacy in mobile services
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access
Formal anonymity models for efficient privacy-preserving joins
Data & Knowledge Engineering
Tree-Based Microaggregation for the Anonymization of Search Logs
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Simulating low-latency anonymous networks
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
An integrated framework for de-identifying unstructured medical data
Data & Knowledge Engineering
Navigational path privacy protection: navigational path privacy protection
Proceedings of the 18th ACM conference on Information and knowledge management
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Proceedings of the 18th ACM conference on Information and knowledge management
Effective anonymization of query logs
Proceedings of the 18th ACM conference on Information and knowledge management
A framework for safely publishing communication traces
Proceedings of the 18th ACM conference on Information and knowledge management
Online anonymity for personalized web services
Proceedings of the 18th ACM conference on Information and knowledge management
Injecting purpose and trust into data anonymisation
Proceedings of the 18th ACM conference on Information and knowledge management
Structure preserving anonymization of router configuration data
IEEE Journal on Selected Areas in Communications - Special issue on network infrastructure configuration
Applying differential privacy to search queries in a policy based interactive framework
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
Incremental privacy preservation for associative classification
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
Decision Support Systems
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
Distortion-based anonymity for continuous queries in location-based mobile services
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
A distortion-based metric for location privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
StarClique: guaranteeing user privacy in social networks against intersection attacks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Privacy and consent in pervasive networks
Information Security Tech. Report
Privacy-preserving similarity-based text retrieval
ACM Transactions on Internet Technology (TOIT)
Density-based microaggregation for statistical disclosure control
Expert Systems with Applications: An International Journal
The role of network trace anonymization under attack
ACM SIGCOMM Computer Communication Review
TIAMAT: a tool for interactive analysis of microdata anonymization techniques
Proceedings of the VLDB Endowment
Class-based graph anonymization for social network data
Proceedings of the VLDB Endowment
Anonymization of set-valued data via top-down, local generalization
Proceedings of the VLDB Endowment
k-automorphism: a general framework for privacy preserving network publication
Proceedings of the VLDB Endowment
Publishing naive Bayesian classifiers: privacy without accuracy loss
Proceedings of the VLDB Endowment
Micro-SOM: A Linear-Time Multivariate Microaggregation Algorithm Based on Self-Organizing Maps
ICANN '09 Proceedings of the 19th International Conference on Artificial Neural Networks: Part I
FM '09 Proceedings of the 2nd World Congress on Formal Methods
Anonymity and Censorship Resistance in Unstructured Overlay Networks
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
Privacy in a Semantic Cloud: What's Trust Got to Do with It?
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Privacy of Value-Added Context-Aware Service Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Secure construction of k-unlinkable patient records from distributed providers
Artificial Intelligence in Medicine
Differential privacy with compression
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
A measure of online social networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Poster Abstract: CacheCloak: enabling realtime location privacy for mobile users
ACM SIGMOBILE Mobile Computing and Communications Review
Anonymizing bipartite graph data using safe groupings
The VLDB Journal — The International Journal on Very Large Data Bases
A method of deciding the security in publishing views
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
k-symmetry model for identity anonymization in social networks
Proceedings of the 13th International Conference on Extending Database Technology
Private record matching using differential privacy
Proceedings of the 13th International Conference on Extending Database Technology
The hardness and approximation algorithms for l-diversity
Proceedings of the 13th International Conference on Extending Database Technology
Preventing multi-query attack in location-based services
Proceedings of the third ACM conference on Wireless network security
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Lurking? cyclopaths?: a quantitative lifecycle analysis of user behavior in a geowiki
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Proceedings of the 2010 EDBT/ICDT Workshops
Towards publishing recommendation data with predictive anonymization
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Restoring compromised privacy in micro-data disclosure
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Privacy-preserving sequential pattern release
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
Privacy-enhanced web personalization
The adaptive web
(α, k)-anonymity based privacy preservation by lossy join
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
Speeding up clustering-based k-anonymisation algorithms with pre-partitioning
BNCOD'07 Proceedings of the 24th British national conference on Databases
Granulation as a privacy protection mechanism
Transactions on rough sets VII
K-anonymization with minimal loss of information
ESA'07 Proceedings of the 15th annual European conference on Algorithms
A composite privacy protection model
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Generating microdata with p-sensitive k-anonymity property
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
A three-dimensional conceptual framework for database privacy
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Practical issues on privacy-preserving health data mining
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Efficient k-anonymization using clustering techniques
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Protecting individual information against inference attacks in data publishing
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Quality aware privacy protection for location-based services
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Implementation of bitmap based incognito and performance evaluation
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Capture inference attacks for K-anonymity with privacy inference logic
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
MOBIHIDE: a mobilea peer-to-peer system for anonymous location-based queries
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Risk & distortion based K-anonymity
WISA'07 Proceedings of the 8th international conference on Information security applications
Privacy protection on multiple sensitive attributes
ICICS'07 Proceedings of the 9th international conference on Information and communications security
K-anonymous multi-party secret handshakes
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Large-scale k-means clustering with user-centric privacy preservation
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
The k-anonymity problem is hard
FCT'09 Proceedings of the 17th international conference on Fundamentals of computation theory
Simple dynamic key management in SQL randomization
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Privacy inference attacking and prevention on multiple relative k-anonymized microdata sets
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
On the complexity of restricted k-anonymity problem
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Verification of the security against inference attacks on XML databases
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Healthcom'09 Proceedings of the 11th international conference on e-Health networking, applications and services
Privacy-preserving data mining: A feature set partitioning approach
Information Sciences: an International Journal
Using social networks to distort users' profiles generated by web search engines
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the forty-second ACM symposium on Theory of computing
Privacy-preserving query log mining for business confidentiality protection
ACM Transactions on the Web (TWEB)
Universally optimal privacy mechanisms for minimax agents
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Towards an axiomatization of statistical privacy and utility
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
K-isomorphism: privacy preserving network publication against structural attacks
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Load-balanced query dissemination in privacy-aware online communities
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Differentially private aggregation of distributed time-series with transformation and encryption
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Non-homogeneous generalization in privacy preserving data publishing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Preserving privacy and fairness in peer-to-peer data integration
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
Anonymous biometric access control
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
Preserving privacy in participatory sensing systems
Computer Communications
Providing location privacy in pervasive computing through a hybrid mechanism
International Journal of Internet Technology and Secured Transactions
Human behavior and challenges of anonymizing WLAN traces
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A purpose-based privacy-aware system using privacy data graph
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Measuring long-term location privacy in vehicular communication systems
Computer Communications
Privacy-aware traffic monitoring
IEEE Transactions on Intelligent Transportation Systems
P-Sensitive K-Anonymity with Generalization Constraints
Transactions on Data Privacy
Suppressing microdata to prevent classification based inference
The VLDB Journal — The International Journal on Very Large Data Bases
Optimal constraint-based decision tree induction from itemset lattices
Data Mining and Knowledge Discovery
Privacy issues in scientific workflow provenance
Proceedings of the 1st International Workshop on Workflow Approaches to New Data-centric Science
Facilitating discovery on the private web using dataset digests
International Journal of Metadata, Semantics and Ontologies
The demographics of web search
Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval
Privacy-preserving outsourcing support vector machines with random transformation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Discovering frequent patterns in sensitive data
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection
INFORMS Journal on Computing
Privacy-preserving collaborative recommender systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Adjoining classified and unclassified information by abstract interpretation
Journal of Computer Security
Comparison of microaggregation approaches on anonymized data quality
Expert Systems with Applications: An International Journal
Approximate algorithms with generalizing attribute values for k-anonymity
Information Systems
Harmonizing privacy with security principles and practices
IBM Journal of Research and Development
Dynamic masking of application displays using OCR technologies
IBM Journal of Research and Development
An online framework for publishing privacy-sensitive location traces
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Differentially-private network trace analysis
Proceedings of the ACM SIGCOMM 2010 conference
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
A systematic literature review of inference strategies
International Journal of Information and Computer Security
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
VPriv: protecting privacy in location-based vehicular services
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
A flexible architecture for privacy-aware trust management
Journal of Theoretical and Applied Electronic Commerce Research
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy vulnerability of published anonymous mobility traces
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Online anonymity protection in computer-mediated communication
IEEE Transactions on Information Forensics and Security
Systematic clustering method for l-diversity model
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight
Proceedings of the 2010 ACM workshop on Insider threats
Investigating privacy-aware distributed query evaluation
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Louhi '10 Proceedings of the NAACL HLT 2010 Second Louhi Workshop on Text and Data Mining of Health Documents
Privacy-preserving publication of trajectories using microaggregation
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Show me how you move and I will tell you who you are
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Privacy-aware regression modeling of participatory sensing data
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
Search-log anonymization and advertisement: are they mutually exclusive?
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
Balancing accuracy and privacy of OLAP aggregations on data cubes
DOLAP '10 Proceedings of the ACM 13th international workshop on Data warehousing and OLAP
Generalizing PIR for practical private retrieval of public data
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Understanding privacy risk of publishing decision trees
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
I know what you will do next summer
ACM SIGCOMM Computer Communication Review
Resolving the complexity of some data privacy problems
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
Synthesizing: art of anonymization
DEXA'10 Proceedings of the 21st international conference on Database and expert systems applications: Part I
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Proceedings of the 1st ACM International Health Informatics Symposium
ECDL'10 Proceedings of the 14th European conference on Research and advanced technology for digital libraries
Uncertainty for anonymity and 2-dimensional range query distortion
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Semantic microaggregation for the anonymization of query logs
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Disclosure risk of synthetic population data with application in the case of EU-SILC
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Privacy-preserving record linkage
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
On-the-fly hierarchies for numerical attributes in data anonymization
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
A family of enhanced (L,α)-diversity models for privacy preserving data publishing
Future Generation Computer Systems
Ontology-driven web-based semantic similarity
Journal of Intelligent Information Systems
"But the data is already public": on the ethics of research in Facebook
Ethics and Information Technology
The Role of Ontologies in the Anonymization of Textual Variables
Proceedings of the 2010 conference on Artificial Intelligence Research and Development: Proceedings of the 13th International Conference of the Catalan Association for Artificial Intelligence
Achieving K-anonymity in mobile ad hoc networks
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Identity in the Information Society
Relationships and data sanitization: a study in scarlet
Proceedings of the 2010 workshop on New security paradigms
Secure personal data servers: a vision paper
Proceedings of the VLDB Endowment
Cheetah: a high performance, custom data warehouse on top of MapReduce
Proceedings of the VLDB Endowment
Resisting structural re-identification in anonymized social networks
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy policy conflict detection method for multi-owner privacy data protection
Electronic Commerce Research
Preventing range disclosure in k-anonymised data
Expert Systems with Applications: An International Journal
On the impossibility of cryptography alone for privacy-preserving cloud computing
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Ontology-based anonymization of categorical values
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
Towards semantic microaggregation of categorical data for confidential documents
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
ACM Transactions on Database Systems (TODS)
Location privacy and resilience in wireless sensor networks querying
Computer Communications
Extended k-anonymity models against sensitive attribute disclosure
Computer Communications
Local and global recoding methods for anonymizing set-valued data
The VLDB Journal — The International Journal on Very Large Data Bases
Proceedings of the 14th International Conference on Database Theory
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
AnonySense: A system for anonymous opportunistic sensing
Pervasive and Mobile Computing
Mixture of gaussian models and bayes error under differential privacy
Proceedings of the first ACM conference on Data and application security and privacy
Privacy-preserving publishing microdata with full functional dependencies
Data & Knowledge Engineering
ICDCN'11 Proceedings of the 12th international conference on Distributed computing and networking
A utility-theoretic approach to privacy in online services
Journal of Artificial Intelligence Research
Privacy-preserving data sharing in cloud computing
Journal of Computer Science and Technology
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Anonymizing Set-Valued Social Data
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Towards knowledge intensive data privacy
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
FAANST: fast anonymizing algorithm for numerical streaming data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Surveillance, privacy and the law of requisite variety
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Checking anonymity levels for anonymized data
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
Location privacy protection on social networks
SBP'11 Proceedings of the 4th international conference on Social computing, behavioral-cultural modeling and prediction
Event handoff unobservability in WSN
iNetSec'10 Proceedings of the 2010 IFIP WG 11.4 international conference on Open research problems in network security
Design and analysis of a ranking approach to private location-based services
ACM Transactions on Database Systems (TODS)
PCTA: privacy-constrained clustering-based transaction data anonymization
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Learning latent variable models from distributed and abstracted data
Information Sciences: an International Journal
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Verification of data pattern for interactive privacy preservation model
Proceedings of the 2011 ACM Symposium on Applied Computing
Associative classification rules hiding for privacy preservation
International Journal of Intelligent Information and Database Systems
Privacy-preserving Bayesian network parameter learning
CIMMACS'05 Proceedings of the 4th WSEAS international conference on Computational intelligence, man-machine systems and cybernetics
Privacy-aware collection of aggregate spatial data
Data & Knowledge Engineering
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Parameterized complexity of k-anonymity: hardness and tractability
IWOCA'10 Proceedings of the 21st international conference on Combinatorial algorithms
Provenance views for module privacy
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Data generation using declarative constraints
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Privacy revelations for web and mobile apps
HotOS'13 Proceedings of the 13th USENIX conference on Hot topics in operating systems
Can the Utility of Anonymized Data be Used for Privacy Breaches?
ACM Transactions on Knowledge Discovery from Data (TKDD)
An efficient clustering algorithm for k-anonymisation
Journal of Computer Science and Technology
kb-anonymity: a model for anonymized behaviour-preserving test and debugging data
Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation
Adaptive, secure, and scalable distributed data outsourcing: a vision paper
Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems
Anonymizing shortest paths on social network graphs
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
Utility-oriented K-anonymization on social networks
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I
Distributed privacy preserving data collection
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I
Anonymizing binary and small tables is hard to approximate
Journal of Combinatorial Optimization
Query-aware location anonymization for road networks
Geoinformatica
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
Proceedings of the fourth ACM conference on Wireless network security
Transforming provenance using redaction
Proceedings of the 16th ACM symposium on Access control models and technologies
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Sanitizing microdata without leak: combining preventive and curative actions
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
CrowdLogging: distributed, private, and anonymous search logging
Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval
Exploiting social networks to provide privacy in personalized web search
Journal of Systems and Software
Transactions on Data Privacy
Show Me How You Move and I Will Tell You Who You Are
Transactions on Data Privacy
Differentially private data release for data mining
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Personal privacy vs population privacy: learning to attack anonymization
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving social network publication against friendship attacks
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Protecting location privacy using location semantics
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Spatially regularized logistic regression for disease mapping on large moving populations
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially Private Empirical Risk Minimization
The Journal of Machine Learning Research
Quantifying fine-grained privacy risk and representativeness in medical data
Proceedings of the 2011 workshop on Data mining for medicine and healthcare
Testing software in age of data privacy: a balancing act
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering
Privacy preservation for associative classification: an approximation algorithm
International Journal of Business Intelligence and Data Mining
Journal of Computer and System Sciences
On the difficulty of achieving anonymity for Vehicle-2-X communication
Computer Networks: The International Journal of Computer and Telecommunications Networking
RAD: Recipient-anonymous data delivery based on public routing proxies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Query processing in private data outsourcing using anonymization
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Preserving privacy in structural neuroimages
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Anonymization of location data does not work: a large-scale measurement study
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
A privacy-aware framework for participatory sensing
ACM SIGKDD Explorations Newsletter
Dynamic anonymization for marginal publication
SSDBM'11 Proceedings of the 23rd international conference on Scientific and statistical database management
A comparison of two different types of online social network from a data privacy perspective
MDAI'11 Proceedings of the 8th international conference on Modeling decisions for artificial intelligence
Pattern-guided data anonymization and clustering
MFCS'11 Proceedings of the 36th international conference on Mathematical foundations of computer science
On the complexity of the l-diversity problem
MFCS'11 Proceedings of the 36th international conference on Mathematical foundations of computer science
The effect of homogeneity on the complexity of k-anonymity
FCT'11 Proceedings of the 18th international conference on Fundamentals of computation theory
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy beyond single sensitive attribute
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
On guaranteeing k-anonymity in location databases
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Privacy measures for free text documents: bridging the gap between theory and practice
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Privacy-preserving storage and access of medical data through pseudonymization and encryption
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Publishing anonymous survey rating data
Data Mining and Knowledge Discovery
Quantifying privacy violations
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
On-the-fly generalization hierarchies for numerical attributes revisited
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Sensorsafe: a framework for privacy-preserving management of personal sensory information
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
An improved EDP algorithm to privacy protection in data mining
BI'11 Proceedings of the 2011 international conference on Brain informatics
Communications of the ACM
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
I know where you live: analyzing privacy protection in public databases
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Cloning for privacy protection in multiple independent data publications
Proceedings of the 20th ACM international conference on Information and knowledge management
Privacy-aware querying over sensitive trajectory data
Proceedings of the 20th ACM international conference on Information and knowledge management
Sharing graphs using differentially private graph models
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
For sale : your data: by : you
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
Preserving privacy of moving objects via temporal clustering of spatio-temporal data streams
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Differential privacy for location pattern mining
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
Formal methods as a link between software code and legal rules
SEFM'11 Proceedings of the 9th international conference on Software engineering and formal methods
Proceedings of the 2011 Workshop on Governance of Technology, Information, and Policies
Privacy preserving via tree augmented naïve Bayesian classifier in multimedia database
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Proceedings of the Seventh Symposium on Usable Privacy and Security
Terminal Backup, 3D Matching, and Covering Cubic Graphs
SIAM Journal on Computing
Weak k-anonymity: a low-distortion model for protecting privacy
ISC'06 Proceedings of the 9th international conference on Information Security
Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data
Information Systems Research
The tradeoffs of societal computing
Proceedings of the 10th SIGPLAN symposium on New ideas, new paradigms, and reflections on programming and software
An attacker's view of distance preserving maps for privacy preserving data mining
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Anonymous user tracking for location-based community services
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Preserving privacy on the searchable internet
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
On robust and effective k-anonymity in large databases
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
PKDD'05 Proceedings of the 9th European conference on Principles and Practice of Knowledge Discovery in Databases
Can attackers learn from samples?
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Suppressing microdata to prevent probabilistic classification based inference
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Cloud computing without seeing
Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies
Privacy enhancement in mobile data broadcasting environments
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
The impact of data obfuscation on the accuracy of collaborative filtering
Expert Systems with Applications: An International Journal
Data anonymization using an improved utility measurement
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Uniqueness and how it impacts privacy in health-related social science datasets
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
An analytical solution for consent management in patient privacy preservation
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Authorization-Transparent access control for XML under the non-truman model
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
Achieving k-anonymity by clustering in attribute hierarchical structures
DaWaK'06 Proceedings of the 8th international conference on Data Warehousing and Knowledge Discovery
A grc-based approach to social network data protection
RSCTC'06 Proceedings of the 5th international conference on Rough Sets and Current Trends in Computing
k-ARQ: k-anonymous ranking queries
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part I
On t-closeness with KL-divergence and semantic privacy
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Privacy-preserving publishing data with full functional dependencies
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Privacy and anonymization as a service: PASS
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Applied quantitative information flow and statistical databases
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
ICDT'05 Proceedings of the 10th international conference on Database Theory
Stalking online: on user privacy in social networks
Proceedings of the second ACM conference on Data and Application Security and Privacy
Privacy-Preserving database systems
Foundations of Security Analysis and Design III
Privacy-Preserving collaborative association rule mining
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy-preserving distributed k-anonymity
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
On sketch based anonymization that satisfies differential privacy model
AI'10 Proceedings of the 23rd Canadian conference on Advances in Artificial Intelligence
A new k-anonymous message transmission protocol
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Anonymity and roles associated with aggressive posts in an online forum
Computers in Human Behavior
A user-centric privacy framework for pervasive environments
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Limiting disclosure of sensitive data in sequential releases of databases
Information Sciences: an International Journal
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Private mining of association rules
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Data distortion for privacy protection in a terrorist analysis system
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Keeping Found Things Found: The Study and Practice of Personal Information Management: The Study and Practice of Personal Information Management
Privacy aware publishing of successive location information in sensor networks
Future Generation Computer Systems
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Information disclosure by XPath queries
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Privacy preservation and protection by extending generalized partial indices
BNCOD'06 Proceedings of the 23rd British National Conference on Databases, conference on Flexible and Efficient Information Handling
Towards a more reasonable generalization cost metric for k-anonymization
BNCOD'06 Proceedings of the 23rd British National Conference on Databases, conference on Flexible and Efficient Information Handling
Distributed data mining protocols for privacy: a review of some recent results
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Towards an anti-inference (k, ℓ)-anonymity model with value association rules
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Privacy injector — automated privacy enforcement through aspects
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Microaggregation for database and location privacy
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
Shadow: a middleware in pervasive computing environment for user controllable privacy protection
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Balancing smartness and privacy for the ambient intelligence
EuroSSC'06 Proceedings of the First European conference on Smart Sensing and Context
Optimal multivariate 2-microaggregation for microdata protection: a 2-approximation
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
A spatial cloaking framework based on range search for nearest neighbor search
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Generalizations and extensions of redactable signatures with applications to electronic healthcare
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Hiding emerging patterns with local recoding generalization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Satisfying privacy requirements: one step before anonymization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Anonymity preserving techniques in trust negotiations
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Integrating utility into face de-identification
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Calibrating noise to sensitivity in private data analysis
TCC'06 Proceedings of the Third conference on Theory of Cryptography
The impact of trace and adversary models on location privacy provided by K-anonymity
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
Utility-preserving transaction data anonymization with low information loss
Expert Systems with Applications: An International Journal
User k-anonymity for privacy preserving data mining of query logs
Information Processing and Management: an International Journal
Preserving query privacy in urban sensing systems
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Emphasizing ethics and privacy preservation in an undergraduate data mining course
Journal of Computing Sciences in Colleges
Providing group anonymity using wavelet transform
BNCOD'10 Proceedings of the 27th British national conference on Data Security and Security Data
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Permutation anonymization: improving anatomy for privacy preservation in data publication
PAKDD'11 Proceedings of the 15th international conference on New Frontiers in Applied Data Mining
G2C: cryptographic protocols from goal-driven specifications
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
User Modeling and User-Adapted Interaction
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
A practical approximation algorithm for optimal k-anonymity
Data Mining and Knowledge Discovery
k-Concealment: An Alternative Model of k-Type Anonymity
Transactions on Data Privacy
Utility-guided Clustering-based Transaction Data Anonymization
Transactions on Data Privacy
A Practical Differentially Private Random Decision Tree Classifier
Transactions on Data Privacy
Transactions on Data Privacy
Shortest path computation with no information leakage
Proceedings of the VLDB Endowment
GUPT: privacy preserving data analysis made easy
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Aggregate suppression for enterprise search engines
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Fast track article: Balancing behavioral privacy and information utility in sensory data flows
Pervasive and Mobile Computing
Towards statistical queries over distributed private user data
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Koi: a location-privacy platform for smartphone apps
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Information fusion in data privacy: A survey
Information Fusion
Medical privacy protection based on granular computing
Artificial Intelligence in Medicine
Fake injection strategies for private phonetic matching
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
The loss of location privacy in the cellular age
Communications of the ACM
A historical probability based noise generation strategy for privacy protection in cloud computing
Journal of Computer and System Sciences
Microaggregation- and permutation-based anonymization of movement data
Information Sciences: an International Journal
Reference table based k-anonymous private blocking
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Provable de-anonymization of large datasets with sparse dimensions
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Data privacy against composition attack
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part I
Semi-Edge anonymity: graph publication when the protection algorithm is available
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part I
On the identity anonymization of high-dimensional rating data
Concurrency and Computation: Practice & Experience
Efficient and Practical Approach for Private Record Linkage
Journal of Data and Information Quality (JDIQ)
Survey: DNA-inspired information concealing: A survey
Computer Science Review
Information based data anonymization for classification utility
Data & Knowledge Engineering
SecTTS: A secure track & trace system for RFID-enabled supply chains
Computers in Industry
Towards planet-scale localization on smartphones with a partial radiomap
Proceedings of the 4th ACM international workshop on Hot topics in planet-scale measurement
A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
n-confusion: a generalization of k-anonymity
Proceedings of the 2012 Joint EDBT/ICDT Workshops
A context-aware scheme for privacy-preserving location-based services
Computer Networks: The International Journal of Computer and Telecommunications Networking
A dynamic logic for privacy compliance
Artificial Intelligence and Law - Special issue on Deontic Logic and Normative Systems
Privacy preservation by disassociation
Proceedings of the VLDB Endowment
Privacy and utility for defect prediction: experiments with MORPH
Proceedings of the 34th International Conference on Software Engineering
Proceedings of the 34th International Conference on Software Engineering
Differentially private transit data publication: a case study on the montreal transportation system
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Analyzing characteristic host access patterns for re-identification of web user sessions
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Methods for privacy protection considering status of service provider and user community
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Location privacy in relation to trusted peers
STM'11 Proceedings of the 7th international conference on Security and Trust Management
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Detecting dependencies in an anonymized dataset
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Privacy preserving social network publication on bipartite graphs
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Privacy bubbles: user-centered privacy control for mobile content sharing applications
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
PrivBasis: frequent itemset mining with differential privacy
Proceedings of the VLDB Endowment
Proceedings of the Sixth International Workshop on Data Mining for Online Advertising and Internet Economy
CMOA: continuous moving object anonymization
Proceedings of the 16th International Database Engineering & Applications Sysmposium
Usage data in web search: benefits and limitations
SSDBM'12 Proceedings of the 24th international conference on Scientific and Statistical Database Management
Sensitive label privacy protection on social network data
SSDBM'12 Proceedings of the 24th international conference on Scientific and Statistical Database Management
Logics for security and privacy
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Privacy consensus in anonymization systems via game theory
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Distributed data federation without disclosure of user existence
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
k-indistinguishable traffic padding in web applications
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Secure distributed framework for achieving ε-differential privacy
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Adaptive differentially private histogram of low-dimensional data
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
On Distributed k-Anonymization
Fundamenta Informaticae
Privacy-preserving social plugins
Security'12 Proceedings of the 21st USENIX conference on Security symposium
An algorithm for k-anonymity-based fingerprinting
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Improvements on a privacy-protection algorithm for DNA sequences with generalization lattices
Computer Methods and Programs in Biomedicine
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Privacy-preserving deletion to generalization-based anonymous database
Proceedings of the CUBE International Information Technology Conference
A clustering approach for structural k-anonymity in social networks using genetic algorithm
Proceedings of the CUBE International Information Technology Conference
An information theoretic framework for web inference detection
Proceedings of the 5th ACM workshop on Security and artificial intelligence
Information Sciences: an International Journal
On location privacy and quality of information in participatory sensing
Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
DJoin: differentially private join queries over distributed databases
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
An automated data utility clustering methodology using data constraint rules
Proceedings of the 2012 international workshop on Smart health and wellbeing
Differentially private top-k query over MapReduce
Proceedings of the fourth international workshop on Cloud data management
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Privacy protection in location-based services through a public-key privacy homomorphism
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
A stab at approximating minimum subadditive join
WADS'07 Proceedings of the 10th international conference on Algorithms and Data Structures
Clustering-based k-anonymisation algorithms
DEXA'07 Proceedings of the 18th international conference on Database and Expert Systems Applications
A modification of the k-means method for quasi-unsupervised learning
Knowledge-Based Systems
ICTAC'12 Proceedings of the 9th international conference on Theoretical Aspects of Computing
A probabilistic hybrid logic for sanitized information systems
SUM'12 Proceedings of the 6th international conference on Scalable Uncertainty Management
Context-aware efficient message propagation
Proceedings of the 11th International Workshop on Adaptive and Reflective Middleware
Formalising security in ubiquitous and cloud scenarios
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
n-cycle swapping for the American community survey
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
"Better than nothing" privacy with bloom filters: to what extent?
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Hilbert-order based spatial cloaking algorithm in road network
Concurrency and Computation: Practice & Experience
Non-interactive differential privacy: a survey
Proceedings of the First International Workshop on Open Data
Breaching Euclidean distance-preserving data perturbation using few known inputs
Data & Knowledge Engineering
An Enhanced Utility-Driven Data Anonymization Method
Transactions on Data Privacy
t-Plausibility: Generalizing Words to Desensitize Text
Transactions on Data Privacy
Privacy aware trajectory determination in road traffic networks
Proceedings of the 20th International Conference on Advances in Geographic Information Systems
High stakes: designing a privacy preserving registry
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Comparing random-based and k-anonymity-based algorithms for graph anonymization
MDAI'12 Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part I
Privacy protection in social networks using l-diversity
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Optimal univariate microaggregation with data suppression
Journal of Systems and Software
Efficient discovery of de-identification policy options through a risk-utility frontier
Proceedings of the third ACM conference on Data and application security and privacy
Privacy by design: a formal framework for the analysis of architectural choices
Proceedings of the third ACM conference on Data and application security and privacy
NSS'12 Proceedings of the 6th international conference on Network and System Security
Differential privacy data release through adding noise on average value
NSS'12 Proceedings of the 6th international conference on Network and System Security
Protecting User Privacy Better with Query l-Diversity
International Journal of Information Security and Privacy
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification
International Journal of Information Security and Privacy
Radiator: context propagation based on delayed aggregation
Proceedings of the 2013 conference on Computer supported cooperative work
Differential private trajectory protection of moving objects
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal Data
Information Sciences: an International Journal
A framework for context-aware privacy of sensor data on mobile systems
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications
Information Security Tech. Report
A propagation model for provenance views of public/private workflows
Proceedings of the 16th International Conference on Database Theory
A cooperative method for privacy preservation in real-time location monitoring services
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Lightweight privacy-preserving peer-to-peer data integration
Proceedings of the VLDB Endowment
Priority driven k-anonymisation for privacy protection
AusDM '08 Proceedings of the 7th Australasian Data Mining Conference - Volume 87
Studying genotype-phenotype attack on k-anonymised medical and genomic data
AusDM '09 Proceedings of the Eighth Australasian Data Mining Conference - Volume 101
Testing the lipschitz property over product distributions with applications to data privacy
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Updating outsourced anatomized private databases
Proceedings of the 16th International Conference on Extending Database Technology
AIM: a new privacy preservation algorithm for incomplete microdata based on anatomy
ICPCA/SWS'12 Proceedings of the 2012 international conference on Pervasive Computing and the Networked World
Privacy protection in personalized web search: a peer group-based approach
SBP'13 Proceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction
A privacy framework: indistinguishable privacy
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Anonymizing sequential releases under arbitrary updates
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Semantic search log k-anonymization with generalized k-cores of query concept graph
ECIR'13 Proceedings of the 35th European conference on Advances in Information Retrieval
A versatile tool for privacy-enhanced web search
ECIR'13 Proceedings of the 35th European conference on Advances in Information Retrieval
Re-identification of Smart Meter data
Personal and Ubiquitous Computing
Multi-agent based middleware for protecting privacy in IPTV content recommender services
Multimedia Tools and Applications
Journal of Biomedical Informatics
International Journal of Reliable and Quality E-Healthcare
Class-Restricted Clustering and Microperturbation for Data Privacy
Management Science
Utility-maximizing event stream suppression
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
IFDB: decentralized information flow control for databases
Proceedings of the 8th ACM European Conference on Computer Systems
Crafting a balance between big data utility and protection in the semantic data cloud
Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics
A taxonomy of privacy-preserving record linkage techniques
Information Systems
Privacy-friendly tasking and trading of energy in smart grids
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Towards a private vector space model for confidential documents
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Fast clustering-based anonymization approaches with time constraints for data streams
Knowledge-Based Systems
Publishing trajectories with differential privacy guarantees
Proceedings of the 25th International Conference on Scientific and Statistical Database Management
SplitX: high-performance private analytics
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Privacy preserving release of blogosphere data in the presence of search engines
Information Processing and Management: an International Journal
A cloud-based consumer-centric architecture for energy data analytics
Proceedings of the fourth international conference on Future energy systems
Developing privacy solutions for sharing and analysing healthcare data
International Journal of Business Information Systems
Preserving privacy and frequent sharing patterns for social network data publishing
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
An algorithm for k-degree anonymity on large networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Fine-grained sharing of sensed physical activity: a value sensitive approach
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
GASNA: greedy algorithm for social network anonymization
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Parameterized complexity of k-anonymity: hardness and tractability
Journal of Combinatorial Optimization
Efficient two-party private blocking based on sorted nearest neighborhood clustering
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Privacy-preserving screen capture: Towards closing the loop for health IT usability
Journal of Biomedical Informatics
Preserving location privacy without exact locations in mobile services
Frontiers of Computer Science: Selected Publications from Chinese Universities
An efficient and robust privacy protection technique for massive streaming choice-based information
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Role-and relationship-based identity management for privacy-enhanced E-Iearning
International Journal of Artificial Intelligence in Education
Incremental processing and indexing for k, e-anonymisation
International Journal of Information and Computer Security
Membership privacy: a unifying framework for privacy definitions
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
On the challenges of balancing privacy and utility of open health data
Joint Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments and Workshop on Semantic Cities
k-subscription: privacy-preserving microblogging browsing through obfuscation
Proceedings of the 29th Annual Computer Security Applications Conference
DiffR-Tree: a differentially private spatial index for OLAP query
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
The hardness of (ε, m)-anonymity
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
VICUS: a noise addition technique for categorical data
AusDM '12 Proceedings of the Tenth Australasian Data Mining Conference - Volume 134
Privacy vulnerability of published anonymous mobility traces
IEEE/ACM Transactions on Networking (TON)
Using safety constraint for transactional dataset anonymization
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Efficient Time-Stamped Event Sequence Anonymization
ACM Transactions on the Web (TWEB)
SEC'13 Proceedings of the 22nd USENIX conference on Security
de-linkability: a privacy-preserving constraint for safely outsourcing multimedia documents
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
SPARSI: partitioning sensitive data amongst multiple adversaries
Proceedings of the VLDB Endowment
Mining frequent patterns with differential privacy
Proceedings of the VLDB Endowment
Privacy intrusiveness and web audiences: Empirical evidence
Telecommunications Policy
A new tool for sharing and querying of clinical documents modeled using HL7 Version 3 standard
Computer Methods and Programs in Biomedicine
Account Reachability: A Measure of Privacy Risk for Exposure of a User's Multiple SNS Accounts
Proceedings of International Conference on Information Integration and Web-based Applications & Services
Process Decomposition Based on Semantics and Privacy-Aware Requirements-Driven Approach
Proceedings of International Conference on Information Integration and Web-based Applications & Services
Improving accuracy of classification models induced from anonymized datasets
Information Sciences: an International Journal
A general framework for privacy preserving data publishing
Knowledge-Based Systems
A query scrambler for search privacy on the internet
Information Retrieval
Multimedia Tools and Applications
The effect of homogeneity on the computational complexity of combinatorial data anonymization
Data Mining and Knowledge Discovery
The l-Diversity problem: Tractability and approximability
Theoretical Computer Science
MAGE: A semantics retaining K-anonymization method for mixed data
Knowledge-Based Systems
Graph publication when the protection algorithm is available
Data & Knowledge Engineering
A near-optimal algorithm for differentially-private principal components
The Journal of Machine Learning Research
Measuring the privacy of user profiles in personalized information systems
Future Generation Computer Systems
Privacy Provisioning in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Multivariate microaggregation by iterative optimization
Applied Intelligence
Distributed and Parallel Databases
Pricing and disseminating customer data with privacy awareness
Decision Support Systems
GeoVanet: A routing protocol for query processing in vehicular networks
Mobile Information Systems
K-anonymous path privacy on social graphs
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology
Hi-index | 0.04 |
Consider a data holder, such as a hospital or a bank, that has a privately held collection of person-specific, field structured data. Suppose the data holder wants to share a version of the data with researchers. How can a data holder release a version of its private data with scientific guarantees that the individuals who are the subjects of the data cannot be re-identified while the data remain practically useful? The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment. A release provides k-anonymity protection if the information for each person contained in the release cannot be distinguished from at least k-1 individuals whose information also appears in the release. This paper also examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected. The k-anonymity protection model is important because it forms the basis on which the real-world systems known as Datafly, µ-Argus and k-Similar provide guarantees of privacy protection.