Practical data-swapping: the first steps
ACM Transactions on Database Systems (TODS)
A data distortion by probability distribution
ACM Transactions on Database Systems (TODS)
Statistical relational tables for statistical database management
IEEE Transactions on Software Engineering
Security and inference in multilevel database and knowledge-base systems
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
ACM Transactions on Database Systems (TODS)
Security of statistical databases: multidimensional transformation
ACM Transactions on Database Systems (TODS)
ACM Transactions on Database Systems (TODS)
Compromising statistical databases responding to queries about means
ACM Transactions on Database Systems (TODS)
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Linear queries in statistical databases
ACM Transactions on Database Systems (TODS)
A fast procedure for finding a tracker in a statistical database
ACM Transactions on Database Systems (TODS)
Security in statistical databases for queries with small counts
ACM Transactions on Database Systems (TODS)
A model of statistical database their security
ACM Transactions on Database Systems (TODS)
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
A security machanism for statistical database
ACM Transactions on Database Systems (TODS)
Security of statistical databases: multidimensional transformation
ACM Transactions on Database Systems (TODS)
The statistical security of a statistical database
ACM Transactions on Database Systems (TODS)
A study on the protection of statistical data bases
SIGMOD '77 Proceedings of the 1977 ACM SIGMOD international conference on Management of data
Cryptography and data security
Cryptography and data security
Diophantine Inferences from Statistical Aggregates on Few-Valued Attributes
Proceedings of the First International Conference on Data Engineering
An Application of Statistical Databases in Manufacturing Testing
Proceedings of the First International Conference on Data Engineering
Information Loss in the Lattice Model of Summary Tables due to Cell Suppression
Proceedings of the Second International Conference on Data Engineering
Security of Statistical Databases - Compromise through Attribute Correlational Modeling
Proceedings of the Second International Conference on Data Engineering
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
An Analytic Approach to Statistical Databases
VLDB '83 Proceedings of the 9th International Conference on Very Large Data Bases
Update handling techniques in statistical databases
SSDBM'81 Proceedings of the 1st LBL Workshop on Statistical database management
Automated cell suppression to preserve confidentiality of business statistics
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
An information theoretic approach to statistical databases and their security: a preliminary report
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
PODS '91 Proceedings of the tenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
An extended memoryless inference control model: accounting for dependence in table-level controls
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
Query evaluation techniques for large databases
ACM Computing Surveys (CSUR)
CIKM '93 Proceedings of the second international conference on Information and knowledge management
A modified random perturbation method for database security
ACM Transactions on Database Systems (TODS)
Inferential security in individual computing environments
ACM SIGICE Bulletin
Hybrid inferential security methods for statistical databases
ACM SIGAPP Applied Computing Review - Special issue on security
ACM Computing Surveys (CSUR)
Private information storage (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Journal of the ACM (JACM)
A deterrent to linear system inferential attacks using a mediator
SAC '94 Proceedings of the 1994 ACM symposium on Applied computing
Security of random data perturbation methods
ACM Transactions on Database Systems (TODS)
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Selective private function evaluation with applications to private statistics
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
Suppressing marginal totals from a two-dimensional table to protect sensitive information
Statistics and Computing
Foundations of Secure Deductive Databases
IEEE Transactions on Knowledge and Data Engineering
Cell Suppression Methodology: The Importance of Suppressing Marginal Totals
IEEE Transactions on Knowledge and Data Engineering
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Practical Data-Oriented Microaggregation for Statistical Disclosure Control
IEEE Transactions on Knowledge and Data Engineering
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
ICDT '03 Proceedings of the 9th International Conference on Database Theory
Database Interrogation Using Conjunctive Queries
ICDT '03 Proceedings of the 9th International Conference on Database Theory
Advances in Inference Control in Statistical Databases: An Overview
Inference Control in Statistical Databases, From Theory to Practice
Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules
DaWaK '99 Proceedings of the First International Conference on Data Warehousing and Knowledge Discovery
Auditing Interval-Based Inference
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Simple Epistemic Logic for Relational Database
MICAI '02 Proceedings of the Second Mexican International Conference on Artificial Intelligence: Advances in Artificial Intelligence
How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases
TSCTC '02 Proceedings of the Third International Conference on Rough Sets and Current Trends in Computing
Censoring Statistical Tables to Protect Sensitive Information: Easy and Hard Problems
SSDBM '96 Proceedings of the Eighth International Conference on Scientific and Statistical Database Management
Security Problems for Statistical Databases with General Cell Suppressions
SSDBM '97 Proceedings of the Ninth International Conference on Scientific and Statistical Database Management
Usability of Compromise-Free Statistical Databases
SSDBM '97 Proceedings of the Ninth International Conference on Scientific and Statistical Database Management
Cardinality-Based Inference Control in Sum-Only Data Cubes
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
RANDOM '98 Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Information Sciences—Informatics and Computer Science: An International Journal
Journal of Computer and System Sciences - Special issue on PODS 2000
Efficient damage assessment and repair in resilient distributed database systems
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
ODAR: an on-the-fly damage assessment and repair system for commercial database applications
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Multidimensional databases
Privacy in multidimensional databases
Multidimensional databases
Remote access systems for statistical analysis of microdata
Statistics and Computing
IEEE Transactions on Knowledge and Data Engineering
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
A framework for privacy preserving classification in data mining
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Privacy preserving mining of association rules
Information Systems - Knowledge discovery and data mining (KDD 2002)
Disclosure risk assessment in statistical data protection
Journal of Computational and Applied Mathematics - Special Issue: Proceedings of the 10th international congress on computational and applied mathematics (ICCAM-2002)
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Privacy preserving database application testing
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
A formal analysis of information disclosure in data exchange
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Privacy-preserving data integration and sharing
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
When do data mining results violate privacy?
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Assessing global disclosure risk in masked microdata
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Cardinality-based inference control in OLAP systems: an information theoretic approach
Proceedings of the 7th ACM international workshop on Data warehousing and OLAP
Privacy-Preserving Data Mining: Why, How, and When
IEEE Security and Privacy
Recognizing frozen variables in constraint satisfaction problems
Theoretical Computer Science
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Practical privacy: the SuLQ framework
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
To do or not to do: the dilemma of disclosing anonymized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Protecting medical data for decision-making analyses
Journal of Medical Systems - Special issue: Computer-based medical systems
Cardinality-based inference control in data cubes
Journal of Computer Security
Minimum Spanning Tree Partitioning Algorithm for Microaggregation
IEEE Transactions on Knowledge and Data Engineering
Maintaining privacy on derived objects
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
IEEE Transactions on Knowledge and Data Engineering
A general model for the answer-perturbation techniques
SSDBM'1994 Proceedings of the 7th international conference on Scientific and Statistical Database Management
Auditing sum-queries to make a statistical database secure
ACM Transactions on Information and System Security (TISSEC)
A research agenda for distributed software development
Proceedings of the 28th international conference on Software engineering
On tracker attacks in health grids
Proceedings of the 2006 ACM symposium on Applied computing
Towards value disclosure analysis in modeling general databases
Proceedings of the 2006 ACM symposium on Applied computing
On the efficiency of checking perfect privacy
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Injecting utility into anonymized datasets
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Real-time data attack isolation for commercial database applications
Journal of Network and Computer Applications
A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining
IEEE Transactions on Knowledge and Data Engineering
Towards robustness in query auditing
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Secure and useful data sharing
Decision Support Systems
A formal analysis of information disclosure in data exchange
Journal of Computer and System Sciences
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data
Information Systems Research
Data ShufflingA New Masking Approach for Numerical Data
Management Science
Smooth sensitivity and sampling in private data analysis
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
TFRP: An efficient microaggregation algorithm for statistical disclosure control
Journal of Systems and Software
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Information disclosure under realistic assumptions: privacy versus optimality
Proceedings of the 14th ACM conference on Computer and communications security
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Privacy-preserving indexing of documents on the network
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Auditing compliance with a Hippocratic database
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Rethinking rank swapping to decrease disclosure risk
Data & Knowledge Engineering
Security analysis of cryptographically controlled access to XML documents
Journal of the ACM (JACM)
On-line data protecting via pseudo random binary sequences
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
A unified framework for protecting sensitive association rules in business collaboration
International Journal of Business Intelligence and Data Mining
Extended RBAC-based design and implementation for a secure data warehouse
International Journal of Business Intelligence and Data Mining
A novel data distortion approach via selective SSVD for privacy protection
International Journal of Information and Computer Security
A real-time intrusion prevention system for commercial enterprise databases and file systems
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
A real-time intrusion prevention system for commercial enterprise databases
SEPADS'05 Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems
Privacy Preserving Database Generation for Database Application Testing
Fundamenta Informaticae - Special issue ISMIS'05
Parity-based inference control for multi-dimensional range sum queries
Journal of Computer Security
Computational complexity of auditing finite attributes in statistical databases
Journal of Computer and System Sciences
Dynamic anonymization: accurate statistical analysis with privacy preservation
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
An efficient hash-based algorithm for minimal k-anonymity
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
A Bayesian approach for on-line max and min auditing
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Attribute selection in multivariate microaggregation
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Workload-aware anonymization techniques for large-scale datasets
ACM Transactions on Database Systems (TODS)
Computer Methods and Programs in Biomedicine
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge
ACM Transactions on Knowledge Discovery from Data (TKDD)
A privacy-aware trajectory tracking query engine
ACM SIGKDD Explorations Newsletter
A real-time intrusion prevention system for commercial enterprise databases and file systems
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
Smallest Bipartite Bridge-Connectivity Augmentation (Extended Abstract)
AAIM '07 Proceedings of the 3rd international conference on Algorithmic Aspects in Information and Management
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
Ordered Data Set Vectorization for Linear Regression on Data Privacy
MDAI '07 Proceedings of the 4th international conference on Modeling Decisions for Artificial Intelligence
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
New Efficient Attacks on Statistical Disclosure Control Mechanisms
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Simulatable Binding: Beyond Simulatable Auditing
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
A Robust Sampling-Based Framework for Privacy Preserving OLAP
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Output perturbation with query relaxation
Proceedings of the VLDB Endowment
On the disclosure risk of multivariate microaggregation
Data & Knowledge Engineering
Privacy-safe network trace sharing via secure queries
Proceedings of the 1st ACM workshop on Network data anonymization
Disclosure Analysis and Control in Statistical Databases
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Knowledge and Information Systems
Information Leakage in Optimal Anonymized and Diversified Data
Information Hiding
Improving Microaggregation for Complex Record Anonymization
MDAI '08 Sabadell Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence
FRAPP: a framework for high-accuracy privacy-preserving mining
Data Mining and Knowledge Discovery
An AI-Based Causal Strategy for Securing Statistical Databases Using Micro-aggregation
AI '08 Proceedings of the 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Applying Privacy Preserving Count Aggregate Queries to k-Classification
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Detecting privacy violations in database publishing using disjoint queries
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Evaluating privacy threats in released database views by symmetric indistinguishability
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Importance partitioning in micro-aggregation
Computational Statistics & Data Analysis
Towards the evaluation of time series protection methods
Information Sciences: an International Journal
Distributed and Parallel Databases
Privately detecting bursts in streaming, distributed time series data
Data & Knowledge Engineering
Security deciding in publishing views based on entropy
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
On Distributed k-Anonymization
Fundamenta Informaticae
AIMHelp: generating help for GUI applications automatically
Proceedings of the 10th International Conference NZ Chapter of the ACM's Special Interest Group on Human-Computer Interaction
Privacy risks in health databases from aggregate disclosure
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Privacy-preserving indexing of documents on the network
The VLDB Journal — The International Journal on Very Large Data Bases
Reconstructing Data Perturbed by Random Projections When the Mixing Matrix Is Known
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
A Bayesian model for disclosure control in statistical databases
Data & Knowledge Engineering
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Bregman divergences in the (m×k)-partitioning problem
Computational Statistics & Data Analysis
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
Decision Support Systems
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Class-based graph anonymization for social network data
Proceedings of the VLDB Endowment
Micro-SOM: A Linear-Time Multivariate Microaggregation Algorithm Based on Self-Organizing Maps
ICANN '09 Proceedings of the 19th International Conference on Artificial Neural Networks: Part I
Self-enforcing Private Inference Control
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
A Bayesian approach for on-line max auditing of dynamic statistical databases
Proceedings of the 2009 EDBT/ICDT Workshops
Auditing user queries in dynamic statistical databases
Information Sciences: an International Journal
A cubic-wise balance approach for privacy preservation in data cubes
Information Sciences: an International Journal
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
The hardness and approximation algorithms for l-diversity
Proceedings of the 13th International Conference on Extending Database Technology
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Proceedings of the 2010 EDBT/ICDT Workshops
Hiding co-occurring sensitive patterns in progressive databases
Proceedings of the 2010 EDBT/ICDT Workshops
Restoring compromised privacy in micro-data disclosure
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Preventing interval-based inference by random data perturbation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
New paradigm of inference control with trusted computing
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
A composite privacy protection model
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Practical issues on privacy-preserving health data mining
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
ICICS'07 Proceedings of the 9th international conference on Information and communications security
ONN the use of neural networks for data privacy
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Phoenix: privacy preserving biclustering on horizontally partitioned data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Towards an axiomatization of statistical privacy and utility
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
User profiling with privacy: a framework for adaptive information agents
Intelligent information agents
The bridge-connectivity augmentation problem with a partition constraint
Theoretical Computer Science
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Communications of the ACM
Suppressing microdata to prevent classification based inference
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy issues in scientific workflow provenance
Proceedings of the 1st International Workshop on Workflow Approaches to New Data-centric Science
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy-aware access control with generalization boundaries
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
A firm foundation for private data analysis
Communications of the ACM
Privacy-aware regression modeling of participatory sensing data
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
Theory of privacy and anonymity
Algorithms and theory of computation handbook
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Proceedings of the 1st ACM International Health Informatics Symposium
Damage assessment and repair in attack resilient distributed database systems
Computer Standards & Interfaces
Software—Practice & Experience - Focus on Selected PhD Literature Reviews in the Practical Aspects of Software Technology
Secure personal data servers: a vision paper
Proceedings of the VLDB Endowment
Using classification methods to evaluate attribute disclosure risk
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
ACM Transactions on Database Systems (TODS)
A utility-theoretic approach to privacy in online services
Journal of Artificial Intelligence Research
Modeling and evaluating information leakage caused by inferences in supply chains
Computers in Industry
A user-oriented anonymization mechanism for public data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Learning latent variable models from distributed and abstracted data
Information Sciences: an International Journal
Privacy-aware collection of aggregate spatial data
Data & Knowledge Engineering
PCPs and the hardness of generating private synthetic data
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Differentially private data cubes: optimizing noise sources and consistency
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Journal of Computer and System Sciences
Statistical analysis for comparison of the key representation database with the original database
International Journal of Business Information Systems
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
Protecting privacy of sensitive value distributions in data release
STM'10 Proceedings of the 6th international conference on Security and trust management
Privacy-aware querying over sensitive trajectory data
Proceedings of the 20th ACM international conference on Information and knowledge management
Privacy preservation by independent component analysis and variance control
Proceedings of the 20th ACM international conference on Information and knowledge management
Protecting data privacy through hard-to-reverse negative databases
ISC'06 Proceedings of the 9th international conference on Information Security
Ask a better question, get a better answer a new approach to private data analysis
ICDT'07 Proceedings of the 11th international conference on Database Theory
Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data
Information Systems Research
The tradeoffs of societal computing
Proceedings of the 10th SIGPLAN symposium on New ideas, new paradigms, and reflections on programming and software
An attacker's view of distance preserving maps for privacy preserving data mining
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
Policy transformations for preventing leakage of sensitive information in email systems
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
A privacy preserving mining algorithm on distributed dataset
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Can attackers learn from samples?
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Suppressing microdata to prevent probabilistic classification based inference
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Data anonymization using an improved utility measurement
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Incorporating privacy concerns in data mining on distributed data
AIMSA'06 Proceedings of the 12th international conference on Artificial Intelligence: methodology, Systems, and Applications
Privacy preserving unsupervised clustering over vertically partitioned data
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Sub-linear queries statistical databases: privacy with power
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Vulnerabilities and threats in distributed systems
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Minimal disclosure in hierarchical hippocratic databases with delegation
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Information theory and the security of binary data perturbation
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Journal of Network and Computer Applications
Indistinguishability: the other aspect of privacy
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Security issues in a SOA-Based provenance system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Viewpoints on emergent semantics
Journal on Data Semantics VI
On optimizing the k-ward micro-aggregation technique for secure statistical databases
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Disclosure analysis for two-way contingency tables
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
A fixed structure learning automaton micro-aggregation technique for secure statistical databases
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Privacy-Preserving data set union
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Disclosure risk in dynamic two-dimensional contingency tables (extended abstract)
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Malafide intension based detection of privacy violation in information system
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Hiding emerging patterns with local recoding generalization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
EPAL based privacy enforcement using ECA rules
ICISS'05 Proceedings of the First international conference on Information Systems Security
Calibrating noise to sensitivity in private data analysis
TCC'06 Proceedings of the Third conference on Theory of Cryptography
A Practical Differentially Private Random Decision Tree Classifier
Transactions on Data Privacy
A rigorous and customizable framework for privacy
PODS '12 Proceedings of the 31st symposium on Principles of Database Systems
Kd-trees and the real disclosure risks of large statistical databases
Information Fusion
Medical privacy protection based on granular computing
Artificial Intelligence in Medicine
Research notes: Research in MIS: the Rutgers perspective
International Journal of Information Management: The Journal for Information Professionals
Detecting dependencies in an anonymized dataset
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
On Distributed k-Anonymization
Fundamenta Informaticae
Privacy Preserving Database Generation for Database Application Testing
Fundamenta Informaticae - Special issue ISMIS'05
Fuzzy based privacy preserving classification of data streams
Proceedings of the CUBE International Information Technology Conference
Computing join aggregates over private tables
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Security of random output perturbation for statistical databases
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
A bayesian approach for on-line sum/count/max/min auditing on boolean data
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Breaching Euclidean distance-preserving data perturbation using few known inputs
Data & Knowledge Engineering
Theoretical Results on De-Anonymization via Linkage Attacks
Transactions on Data Privacy
An Enhanced Utility-Driven Data Anonymization Method
Transactions on Data Privacy
Optimal univariate microaggregation with data suppression
Journal of Systems and Software
Information preservation in statistical privacy and bayesian estimation of unattributed histograms
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Class-Restricted Clustering and Microperturbation for Data Privacy
Management Science
Benevolent deception in human computer interaction
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Crafting a balance between big data utility and protection in the semantic data cloud
Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics
Developing privacy solutions for sharing and analysing healthcare data
International Journal of Business Information Systems
Denials leak information: Simulatable auditing
Journal of Computer and System Sciences
Pufferfish: A framework for mathematical privacy definitions
ACM Transactions on Database Systems (TODS)
Modeling and preventing inferences from sensitive value distributions in data release
Journal of Computer Security - STM'10
Journal of Computer Security
Pricing and disseminating customer data with privacy awareness
Decision Support Systems
Hi-index | 0.03 |
This paper considers the problem of providing security to statistical databases against disclosure of confidential information. Security-control methods suggested in the literature are classified into four general approaches: conceptual, query restriction, data perturbation, and output perturbation.Criteria for evaluating the performance of the various security-control methods are identified. Security-control methods that are based on each of the four approaches are discussed, together with their performance with respect to the identified evaluation criteria. A detailed comparative analysis of the most promising methods for protecting dynamic-online statistical databases is also presented.To date no single security-control method prevents both exact and partial disclosures. There are, however, a few perturbation-based methods that prevent exact disclosure and enable the database administrator to exercise "statistical disclosure control." Some of these methods, however introduce bias into query responses or suffer from the 0/1 query-set-size problem (i.e., partial disclosure is possible in case of null query set or a query set of size 1).We recommend directing future research efforts toward developing new methods that prevent exact disclosure and provide statistical-disclosure control, while at the same time do not suffer from the bias problem and the 0/1 query-set-size problem. Furthermore, efforts directed toward developing a bias-correction mechanism and solving the general problem of small query-set-size would help salvage a few of the current perturbation-based methods.