How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Intelligent integration of information
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
One-way accumulators: a decentralized alternative to digital signatures
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Computationally private information retrieval (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Protecting data privacy in private information retrieval schemes
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Management of heterogeneous and autonomous database systems
Management of heterogeneous and autonomous database systems
Oblivious transfer and polynomial evaluation
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Enhancing privacy and trust in electronic communities
Proceedings of the 1st ACM conference on Electronic commerce
Privacy preserving auctions and mechanism design
Proceedings of the 1st ACM conference on Electronic commerce
Efficient oblivious transfer protocols
SODA '01 Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
Communication preserving protocols for secure function evaluation
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Introduction to Modern Information Retrieval
Introduction to Modern Information Retrieval
Statistical Databases: Characteristics, Problems, and some Solutions
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
A Proposed Architecture for Trusted Third Party Services
Proceedings of the International Conference on Cryptography: Policy and Algorithms
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Replication is not needed: single database, computationally-private information retrieval
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Distributed search over the hidden web: hierarchical database sampling and selection
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Computationally private information retrieval with polylogarithmic communication
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
Leveraging the "Multi" in secure multi-party computation
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Enabling sovereign information sharing using Web Services
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Privacy-preserving data integration and sharing
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving data linkage protocols
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Privacy and Ownership Preserving of Outsourced Medical Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Maintaining Implicated Statistics in Constrained Environments
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Blocking-aware private record linkage
Proceedings of the 2nd international workshop on Information quality in information systems
Distributed privacy preserving information sharing
VLDB '05 Proceedings of the 31st international conference on Very large data bases
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Privacy-Preserving Frequent Pattern Mining across Private Databases
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Privacy-preserving semantic interoperation and access control of heterogeneous databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A secure distributed framework for achieving k-anonymity
The VLDB Journal — The International Journal on Very Large Data Bases
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A privacy-preserving interdomain audit framework
Proceedings of the 5th ACM workshop on Privacy in electronic society
Practical private data matching deterrent to spoofing attacks
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Enabling the 21st century health care information technology revolution
Communications of the ACM - Spam and the ongoing battle for the inbox
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
A formal analysis of information disclosure in data exchange
Journal of Computer and System Sciences
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
Mining multiple private databases using a kNN classifier
Proceedings of the 2007 ACM symposium on Applied computing
Privacy preserving schema and data matching
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
SmartSiren: virus detection and alert for smartphones
Proceedings of the 5th international conference on Mobile systems, applications and services
Event-triggered data and knowledge sharing among collaborating government organizations
dg.o '07 Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains
Privacy-preserving sharing and correction of security alerts
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Precision: Privacy Enhanced Context-Aware Information Fusion in Ubiquitous Healthcare
SEPCASE '07 Proceedings of the 1st International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments
Preserving data privacy in outsourcing data aggregation services
ACM Transactions on Internet Technology (TOIT) - Special Issue on the Internet and Outsourcing
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
Automaton segmentation: a new approach to preserve privacy in xml information brokering
Proceedings of the 14th ACM conference on Computer and communications security
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A novel data distortion approach via selective SSVD for privacy protection
International Journal of Information and Computer Security
Privacy-preserving technology and its applications in statistics measurements
Proceedings of the 2nd international conference on Scalable information systems
Guided perturbation: towards private and accurate mining
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving decision trees over vertically partitioned data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Challenges of Designing Privacy Enhanced Context-Aware Middleware for Assisted Healthcare
ICOST '08 Proceedings of the 6th international conference on Smart Homes and Health Telematics
ABACUS: a distributed middleware for privacy preserving data sharing across private data warehouses
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Privacy-preserving data mashup
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Optimal Privacy-Aware Path in Hippocratic Databases
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Efficient and Anonymous Online Data Collection
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Collusion-resistant anonymous data collection method
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preservation of aggregates in hidden databases: why and how?
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Efficient Robust Private Set Intersection
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Privacy risks in health databases from aggregate disclosure
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Classification spanning private databases
AAAI'06 Proceedings of the 21st national conference on Artificial intelligence - Volume 1
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
Formal anonymity models for efficient privacy-preserving joins
Data & Knowledge Engineering
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Privacy provision in e-learning standardized systems: status and improvements
Computer Standards & Interfaces
Proceedings of the first international workshop on Model driven service engineering and data quality and security
A novel approach for privacy mining of generic basic association rules
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
On the use of wavelet transform for privacy preserving data mining
CI '07 Proceedings of the Third IASTED International Conference on Computational Intelligence
Privacy-Preserving Relationship Path Discovery in Social Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Private record matching using differential privacy
Proceedings of the 13th International Conference on Extending Database Technology
Privacy-preserving schema matching using mutual information
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Towards privacy-preserving model selection
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Preserving privacy and fairness in peer-to-peer data integration
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
A node-failure-resilient anonymous communication protocol through commutative path hopping
INFOCOM'10 Proceedings of the 29th conference on Information communications
IEEE Transactions on Information Technology in Biomedicine
Techniques for policy enforcement on encrypted network traffic
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Privacy-aware access control with generalization boundaries
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Small, stupid, and scalable: secure computing with faerieplay
Proceedings of the fifth ACM workshop on Scalable trusted computing
Privacy-preserving matching of spatial datasets with protection against background knowledge
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Privacy-preserving record linkage
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
A privacy preserving efficient protocol for semantic similarity join using long string attributes
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Privacy preserving group linkage
SSDBM'11 Proceedings of the 23rd international conference on Scientific and statistical database management
Pseudonymization service for X-road eGovernment data exchange layer
EGOVIS'11 Proceedings of the Second international conference on Electronic government and the information systems perspective
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
Privacy-Preserving graph algorithms in the semi-honest model
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Finding pareto-optimal set of distributed vectors with minimum disclosure
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
Privacy preserving decision tree in multi party environment
AIRS'05 Proceedings of the Second Asia conference on Asia Information Retrieval Technology
On honesty in sovereign information sharing
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
Privacy preserving unsupervised clustering over vertically partitioned data
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Privacy-Preserving decision trees over vertically partitioned data
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Integrating private databases for data analysis
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Performance-oriented privacy-preserving data integration
DILS'05 Proceedings of the Second international conference on Data Integration in the Life Sciences
Minimal disclosure in hierarchical hippocratic databases with delegation
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Sovereign information sharing among malicious partners
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Distributed data mining protocols for privacy: a review of some recent results
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
ABACUS: a distributed middleware for privacy preserving data sharing across private data warehouses
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Mutual private set intersection with linear complexity
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Efficient Privacy Preserving Protocols for Similarity Join
Transactions on Data Privacy
Information fusion in data privacy: A survey
Information Fusion
Privacy-preserving frequent itemsets mining via secure collaborative framework
Security and Communication Networks
Efficient and Practical Approach for Private Record Linkage
Journal of Data and Information Quality (JDIQ)
Survey: DNA-inspired information concealing: A survey
Computer Science Review
Efficient robust private set intersection
International Journal of Applied Cryptography
Privacy-preserving deletion to generalization-based anonymous database
Proceedings of the CUBE International Information Technology Conference
Fuzzy based privacy preserving classification of data streams
Proceedings of the CUBE International Information Technology Conference
Computing join aggregates over private tables
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
For some eyes only: protecting online information sharing
Proceedings of the third ACM conference on Data and application security and privacy
Efficient and accurate strategies for differentially-private sliding window queries
Proceedings of the 16th International Conference on Extending Database Technology
International Journal of Applied Cryptography
A taxonomy of privacy-preserving record linkage techniques
Information Systems
An efficient two-party protocol for approximate matching in private record linkage
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications
Proceedings of the 29th Annual Computer Security Applications Conference
From oblivious AES to efficient and secure database join in the multiparty setting
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
An iterative two-party protocol for scalable privacy-preserving record linkage
AusDM '12 Proceedings of the Tenth Australasian Data Mining Conference - Volume 134
Cross-domain privacy-preserving cooperative firewall optimization
IEEE/ACM Transactions on Networking (TON)
Fair private set intersection with a semi-trusted arbiter
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Bloom filter bootstrap: privacy-preserving estimation of the size of an intersection
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Overview of turn data management platform for digital advertising
Proceedings of the VLDB Endowment
Dividing secrets to secure data outsourcing
Information Sciences: an International Journal
Hi-index | 0.00 |
Literature on information integration across databases tacitly assumes that the data in each database can be revealed to the other databases. However, there is an increasing need for sharing information across autonomous entities in such a way that no information apart from the answer to the query is revealed. We formalize the notion of minimal information sharing across private databases, and develop protocols for intersection, equijoin, intersection size, and equijoin size. We also show how new applications can be built using the proposed protocols.