From statistical knowledge bases to degrees of belief: an overview
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy via pseudorandom sketches
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Achieving anonymity via clustering
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
On the efficiency of checking perfect privacy
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Injecting utility into anonymized datasets
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing sequential releases
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
(α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Probabilistic privacy analysis of published views
Proceedings of the 5th ACM workshop on Privacy in electronic society
Towards the Diversity of Sensitive Attributes in k-Anonymity
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Handicapping attacker's confidence: an alternative to k-anonymization
Knowledge and Information Systems
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
Capturing data usefulness and privacy protection in K-anonymisation
Proceedings of the 2007 ACM symposium on Applied computing
K-anonymization incremental maintenance and optimization techniques
Proceedings of the 2007 ACM symposium on Applied computing
Approximate algorithms for K-anonymity
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Hiding the presence of individuals from shared databases
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
GhostDB: querying visible and hidden data without leaks
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
M-invariance: towards privacy preserving re-publication of dynamic datasets
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Anonymizing Classification Data for Privacy Preservation
IEEE Transactions on Knowledge and Data Engineering
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Sanitization models and their limitations
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Data & Knowledge Engineering
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Information disclosure under realistic assumptions: privacy versus optimality
Proceedings of the 14th ACM conference on Computer and communications security
Time series compressibility and privacy
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
The boundary between privacy and utility in data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Minimality attack in privacy preserving data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
K-anonymization as spatial indexing: toward scalable and incremental anonymization
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Fast data anonymization with low information loss
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Privacy skyline: privacy with multidimensional adversarial knowledge
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
From data privacy to location privacy: models and algorithms
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
On static and dynamic methods for condensation-based privacy-preserving data mining
ACM Transactions on Database Systems (TODS)
Towards optimal k-anonymization
Data & Knowledge Engineering
Anonymity for continuous data publishing
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Zerber: r-confidential indexing for distributed documents
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
A framework for condensation-based anonymization of string data
Data Mining and Knowledge Discovery
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Dynamic anonymization: accurate statistical analysis with privacy preservation
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Privacy-MaxEnt: integrating background knowledge in privacy quantification
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Data reduction approach for sensitive associative classification rule hiding
ADC '08 Proceedings of the nineteenth conference on Australasian database - Volume 75
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Protecting privacy in recorded conversations
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Data utility and privacy protection trade-off in k-anonymisation
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
An efficient clustering method for k-anonymization
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
A three-layered model to implement data privacy policies
Computer Standards & Interfaces
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Workload-aware anonymization techniques for large-scale datasets
ACM Transactions on Database Systems (TODS)
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing transaction databases for publication
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites
SSDBM '08 Proceedings of the 20th international conference on Scientific and Statistical Database Management
An Empirical Study of Utility Measures for k-Anonymisation
BNCOD '08 Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Protecting the Publishing Identity in Multiple Tuples
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Data Quality in Privacy Preservation for Associative Classification
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
T-rotation: Multiple Publications of Privacy Preserving Data Sequence
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
How Anonymous Is k-Anonymous? Look at Your Quasi-ID
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
An Anonymity Model Achievable Via Microaggregation
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
BSGI: An Effective Algorithm towards Stronger l-Diversity
DEXA '08 Proceedings of the 19th international conference on Database and Expert Systems Applications
Generalization-Based Privacy-Preserving Data Collection
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Spatial generalisation algorithms for LBS privacy preservation
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Resisting structural re-identification in anonymized social networks
Proceedings of the VLDB Endowment
Privacy-preserving anonymization of set-valued data
Proceedings of the VLDB Endowment
Anonymizing bipartite graph data using safe groupings
Proceedings of the VLDB Endowment
Privacy preserving serial data publishing by role composition
Proceedings of the VLDB Endowment
Privacy preserving document indexing infrastructure for a distributed environment
Proceedings of the VLDB Endowment
A measure of variance for hierarchical nominal attributes
Information Sciences: an International Journal
Does enforcing anonymity mean decreasing data usefulness?
Proceedings of the 4th ACM workshop on Quality of protection
Privacy-safe network trace sharing via secure queries
Proceedings of the 1st ACM workshop on Network data anonymization
A survey of state-of-the-art in anonymity metrics
Proceedings of the 1st ACM workshop on Network data anonymization
Reference models for network data anonymization
Proceedings of the 1st ACM workshop on Network data anonymization
Disclosure Analysis and Control in Statistical Databases
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Privacy: preserving trajectory collection
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
Information Leakage in Optimal Anonymized and Diversified Data
Information Hiding
A Privacy-Protecting Business-Analytics Service for On-Line Transactions
International Journal of Electronic Commerce
L-Diversity Based Dynamic Update for Large Time-Evolving Microdata
AI '08 Proceedings of the 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Facilitating discovery on the private web using dataset digests
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Understanding the privacy-efficiency trade-off in location based queries
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Towards trajectory anonymization: a generalization-based approach
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Anonymizing moving objects: how to hide a MOB in a crowd?
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
On the comparison of microdata disclosure control algorithms
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Detecting privacy violations in database publishing using disjoint queries
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Continuous privacy preserving publishing of data streams
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
HIDE: heterogeneous information DE-identification
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy-preserving incremental data dissemination
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Evaluating privacy threats in released database views by symmetric indistinguishability
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Towards the evaluation of time series protection methods
Information Sciences: an International Journal
Distributed and Parallel Databases
Adversarial-knowledge dimensions in data privacy
The VLDB Journal — The International Journal on Very Large Data Bases
Genetic algorithm-based clustering approach for k-anonymization
Expert Systems with Applications: An International Journal
Privacy protection for RFID data
Proceedings of the 2009 ACM symposium on Applied Computing
Mining Entropy l-Diversity Patterns
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Decomposition: Privacy Preservation for Multiple Sensitive Attributes
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
The union-split algorithm and cluster-based anonymization of social networks
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Confidentiality-preserving distributed proofs of conjunctive queries
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Anonymization-based attacks in privacy-preserving data publishing
ACM Transactions on Database Systems (TODS)
A framework for efficient data anonymization under privacy and accuracy constraints
ACM Transactions on Database Systems (TODS)
A brief survey on anonymization techniques for privacy preserving publishing of social network data
ACM SIGKDD Explorations Newsletter
A tree-based approach to preserve the privacy of software engineering data and predictive models
PROMISE '09 Proceedings of the 5th International Conference on Predictor Models in Software Engineering
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy
Transactions on Data Privacy
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
Transactions on Data Privacy
On the tradeoff between privacy and utility in data publishing
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing location-based RFID data
C3S2E '09 Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering
Information Sciences: an International Journal
Relationship privacy: output perturbation for queries with joins
Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Secure kNN computation on encrypted databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Anonymized data: generation, models, usage
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Location Diversity: Enhanced Privacy Protection in Location Based Services
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
Data and Structural k-Anonymity in Social Networks
Privacy, Security, and Trust in KDD
SSDBM 2009 Proceedings of the 21st International Conference on Scientific and Statistical Database Management
Privacy and location anonymization in location-based services
SIGSPATIAL Special
Clustering-Based Frequency l-Diversity Anonymization
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
On Distributed k-Anonymization
Fundamenta Informaticae
Privacy aware data sharing: balancing the usability and privacy of datasets
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Social networks integration and privacy preservation using subgraph generalization
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
(α, k)-anonymous data publishing
Journal of Intelligent Information Systems
Reconstructing Data Perturbed by Random Projections When the Mixing Matrix Is Known
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
Protecting Sensitive Topics in Text Documents with PROTEXTOR
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
L-Cover: Preserving Diversity by Anonymity
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
A utility-theoretic approach to privacy and personalization
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
Privately querying location-based services with SybilQuery
Proceedings of the 11th international conference on Ubiquitous computing
A novel anonymization algorithm: Privacy protection and knowledge preservation
Expert Systems with Applications: An International Journal
Formal anonymity models for efficient privacy-preserving joins
Data & Knowledge Engineering
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
An integrated framework for de-identifying unstructured medical data
Data & Knowledge Engineering
Injecting purpose and trust into data anonymisation
Proceedings of the 18th ACM conference on Information and knowledge management
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
Decision Support Systems
Privacy-preserving similarity-based text retrieval
ACM Transactions on Internet Technology (TOIT)
Protecting location privacy against spatial inferences: the PROBE approach
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Density-based microaggregation for statistical disclosure control
Expert Systems with Applications: An International Journal
TIAMAT: a tool for interactive analysis of microdata anonymization techniques
Proceedings of the VLDB Endowment
Class-based graph anonymization for social network data
Proceedings of the VLDB Endowment
Data publishing against realistic adversaries
Proceedings of the VLDB Endowment
Optimal random perturbation at multiple privacy levels
Proceedings of the VLDB Endowment
Anonymization of set-valued data via top-down, local generalization
Proceedings of the VLDB Endowment
k-automorphism: a general framework for privacy preserving network publication
Proceedings of the VLDB Endowment
Distribution based microdata anonymization
Proceedings of the VLDB Endowment
Privacy of Value-Added Context-Aware Service Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
A reciprocal framework for spatial K-anonymity
Information Systems
Anonymizing bipartite graph data using safe groupings
The VLDB Journal — The International Journal on Very Large Data Bases
Private record matching using differential privacy
Proceedings of the 13th International Conference on Extending Database Technology
Reducing metadata complexity for faster table summarization
Proceedings of the 13th International Conference on Extending Database Technology
Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk
Transactions on Data Privacy
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Proceedings of the 2010 EDBT/ICDT Workshops
Expressing privacy metrics as one-symbol information
Proceedings of the 2010 EDBT/ICDT Workshops
Towards publishing recommendation data with predictive anonymization
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Restoring compromised privacy in micro-data disclosure
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
(α, k)-anonymity based privacy preservation by lossy join
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
k-anonymization without Q-S associations
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
Speeding up clustering-based k-anonymisation algorithms with pre-partitioning
BNCOD'07 Proceedings of the 24th British national conference on Databases
Granulation as a privacy protection mechanism
Transactions on rough sets VII
Answering queries based on imprecision and uncertainty trade-offs in numeric databases
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Generating microdata with p-sensitive k-anonymity property
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Practical issues on privacy-preserving health data mining
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Quality aware privacy protection for location-based services
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Capture inference attacks for K-anonymity with privacy inference logic
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
MOBIHIDE: a mobilea peer-to-peer system for anonymous location-based queries
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Risk & distortion based K-anonymity
WISA'07 Proceedings of the 8th international conference on Information security applications
Privacy protection on multiple sensitive attributes
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Privacy inference attacking and prevention on multiple relative k-anonymized microdata sets
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Verification of the security against inference attacks on XML databases
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Allowing privacy protection algorithms to jump out of local optimums: an ordered greed framework
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Privacy-preserving data mining through knowledge model sharing
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Preserving the privacy of sensitive relationships in graph data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Achieving anonymity via clustering
ACM Transactions on Algorithms (TALG)
Privacy-preserving data mining: A feature set partitioning approach
Information Sciences: an International Journal
Privacy-aware location data publishing
ACM Transactions on Database Systems (TODS)
Towards an axiomatization of statistical privacy and utility
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
K-isomorphism: privacy preserving network publication against structural attacks
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Differentially private aggregation of distributed time-series with transformation and encryption
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Non-homogeneous generalization in privacy preserving data publishing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Supporting collaborative privacy-observant information sharing using RFID-tagged objects
Advances in Human-Computer Interaction
Preserving privacy in participatory sensing systems
Computer Communications
Human behavior and challenges of anonymizing WLAN traces
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Context quality and privacy - friends or rivals?
QuaCon'09 Proceedings of the 1st international conference on Quality of context
Performance study of active tracking in a cellular network using a modular signaling platform
Proceedings of the 8th international conference on Mobile systems, applications, and services
P-Sensitive K-Anonymity with Generalization Constraints
Transactions on Data Privacy
Movement Data Anonymity through Generalization
Transactions on Data Privacy
Efficient Anonymizations with Enhanced Utility
Transactions on Data Privacy
Suppressing microdata to prevent classification based inference
The VLDB Journal — The International Journal on Very Large Data Bases
Enabling search services on outsourced private spatial data
The VLDB Journal — The International Journal on Very Large Data Bases
Facilitating discovery on the private web using dataset digests
International Journal of Metadata, Semantics and Ontologies
Versatile publishing for privacy preservation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymization of moving objects databases by clustering and perturbation
Information Systems
Approximate algorithms with generalizing attribute values for k-anonymity
Information Systems
An online framework for publishing privacy-sensitive location traces
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
A flexible architecture for privacy-aware trust management
Journal of Theoretical and Applied Electronic Commerce Research
Online anonymity protection in computer-mediated communication
IEEE Transactions on Information Forensics and Security
Systematic clustering method for l-diversity model
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
Microdata protection through approximate microaggregation
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Preserving privacy in semantic-rich trajectories of human mobility
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Search-log anonymization and advertisement: are they mutually exclusive?
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
Anonymizing data with quasi-sensitive attribute values
CIKM '10 Proceedings of the 19th ACM international conference on Information and knowledge management
Generalizing PIR for practical private retrieval of public data
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Understanding privacy risk of publishing decision trees
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
On the identification of property based generalizations in microdata anonymization
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming
Synthesizing: art of anonymization
DEXA'10 Proceedings of the 21st international conference on Database and expert systems applications: Part I
Theory of privacy and anonymity
Algorithms and theory of computation handbook
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Proceedings of the 1st ACM International Health Informatics Symposium
Privacy disclosure analysis and control for 2D contingency tables containing inaccurate data
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
On-the-fly hierarchies for numerical attributes in data anonymization
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
A family of enhanced (L,α)-diversity models for privacy preserving data publishing
Future Generation Computer Systems
Extending l-diversity to generalize sensitive data
Data & Knowledge Engineering
Identity in the Information Society
Relationships and data sanitization: a study in scarlet
Proceedings of the 2010 workshop on New security paradigms
Small domain randomization: same privacy, more utility
Proceedings of the VLDB Endowment
Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data
Proceedings of the VLDB Endowment
Fragments and loose associations: respecting privacy in data publishing
Proceedings of the VLDB Endowment
Resisting structural re-identification in anonymized social networks
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy policy conflict detection method for multi-owner privacy data protection
Electronic Commerce Research
Preventing range disclosure in k-anonymised data
Expert Systems with Applications: An International Journal
Using classification methods to evaluate attribute disclosure risk
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
ACM Transactions on Database Systems (TODS)
ACM Transactions on Database Systems (TODS)
Extended k-anonymity models against sensitive attribute disclosure
Computer Communications
Local and global recoding methods for anonymizing set-valued data
The VLDB Journal — The International Journal on Very Large Data Bases
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness
The VLDB Journal — The International Journal on Very Large Data Bases
Inference control to protect sensitive information in text documents
ACM SIGKDD Workshop on Intelligence and Security Informatics
Mixture of gaussian models and bayes error under differential privacy
Proceedings of the first ACM conference on Data and application security and privacy
Privacy-preserving publishing microdata with full functional dependencies
Data & Knowledge Engineering
A utility-theoretic approach to privacy in online services
Journal of Artificial Intelligence Research
Privacy-preserving data sharing in cloud computing
Journal of Computer Science and Technology
A user-oriented anonymization mechanism for public data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Checking anonymity levels for anonymized data
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
Associative classification rules hiding for privacy preservation
International Journal of Intelligent Information and Database Systems
Provenance views for module privacy
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Differentially private data cubes: optimizing noise sources and consistency
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Can the Utility of Anonymized Data be Used for Privacy Breaches?
ACM Transactions on Knowledge Discovery from Data (TKDD)
An efficient clustering algorithm for k-anonymisation
Journal of Computer Science and Technology
Adaptive, secure, and scalable distributed data outsourcing: a vision paper
Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems
Distributed privacy preserving data collection
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I
An information theoretic approach for privacy metrics
Transactions on Data Privacy
Transactions on Data Privacy
C-safety: a framework for the anonymization of semantic trajectories
Transactions on Data Privacy
Personal privacy vs population privacy: learning to attack anonymization
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially Private Empirical Risk Minimization
The Journal of Machine Learning Research
Privacy preservation for associative classification: an approximation algorithm
International Journal of Business Intelligence and Data Mining
Privacy-aware mobile location-based systems
Proceedings of the 1st international workshop on Mobile location-based service
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
On the complexity of the l-diversity problem
MFCS'11 Proceedings of the 36th international conference on Mathematical foundations of computer science
Privacy beyond single sensitive attribute
DEXA'11 Proceedings of the 22nd international conference on Database and expert systems applications - Volume Part I
Privacy measures for free text documents: bridging the gap between theory and practice
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Publishing anonymous survey rating data
Data Mining and Knowledge Discovery
On-the-fly generalization hierarchies for numerical attributes revisited
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
An approximate microaggregation approach for microdata protection
Expert Systems with Applications: An International Journal
Protecting privacy of sensitive value distributions in data release
STM'10 Proceedings of the 6th international conference on Security and trust management
A publication process model to enable privacy-aware data sharing
IBM Journal of Research and Development
Utility-driven anonymization in data publishing
Proceedings of the 20th ACM international conference on Information and knowledge management
Preserving privacy of moving objects via temporal clustering of spatio-temporal data streams
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Weak k-anonymity: a low-distortion model for protecting privacy
ISC'06 Proceedings of the 9th international conference on Information Security
Query evaluation on a database given by a random graph
ICDT'07 Proceedings of the 11th international conference on Database Theory
Protecting Privacy Against Record Linkage Disclosure: A Bounded Swapping Approach for Numeric Data
Information Systems Research
k-Anonymous Decision Tree Induction
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
An analytical solution for consent management in patient privacy preservation
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Achieving k-anonymity by clustering in attribute hierarchical structures
DaWaK'06 Proceedings of the 8th international conference on Data Warehousing and Knowledge Discovery
On t-closeness with KL-divergence and semantic privacy
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Privacy-preserving publishing data with full functional dependencies
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Privacy and anonymization as a service: PASS
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
On sketch based anonymization that satisfies differential privacy model
AI'10 Proceedings of the 23rd Canadian conference on Advances in Artificial Intelligence
Limiting disclosure of sensitive data in sequential releases of databases
Information Sciences: an International Journal
Privacy aware publishing of successive location information in sensor networks
Future Generation Computer Systems
Journal of Network and Computer Applications
Indistinguishability: the other aspect of privacy
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Towards a more reasonable generalization cost metric for k-anonymization
BNCOD'06 Proceedings of the 23rd British National Conference on Databases, conference on Flexible and Efficient Information Handling
Towards an anti-inference (k, ℓ)-anonymity model with value association rules
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Privacy in the electronic society
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Anonymizing transaction data by integrating suppression and generalization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Satisfying privacy requirements: one step before anonymization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Answering vertex aggregate queries using anonymized social network data
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Permutation anonymization: improving anatomy for privacy preservation in data publication
PAKDD'11 Proceedings of the 15th international conference on New Frontiers in Applied Data Mining
Secure distributed computation of anonymized views of shared databases
ACM Transactions on Database Systems (TODS)
A graph enrichment based clustering over vertically partitioned data
ADMA'11 Proceedings of the 7th international conference on Advanced Data Mining and Applications - Volume Part I
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
k-Concealment: An Alternative Model of k-Type Anonymity
Transactions on Data Privacy
Transactions on Data Privacy
GUPT: privacy preserving data analysis made easy
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Differential privacy in data publication and analysis
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Towards statistical queries over distributed private user data
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Kd-trees and the real disclosure risks of large statistical databases
Information Fusion
Microaggregation- and permutation-based anonymization of movement data
Information Sciences: an International Journal
On the identity anonymization of high-dimensional rating data
Concurrency and Computation: Practice & Experience
P-top-k queries in a probabilistic framework from information extraction models
Computers & Mathematics with Applications
Secure multidimensional range queries over outsourced data
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy preservation by disassociation
Proceedings of the VLDB Endowment
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Detecting dependencies in an anonymized dataset
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Sensitive label privacy protection on social network data
SSDBM'12 Proceedings of the 24th international conference on Scientific and Statistical Database Management
Adaptive differentially private histogram of low-dimensional data
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
On Distributed k-Anonymization
Fundamenta Informaticae
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
DJoin: differentially private join queries over distributed databases
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Clustering-based k-anonymisation algorithms
DEXA'07 Proceedings of the 18th international conference on Database and Expert Systems Applications
A modification of the Lloyd algorithm for k-anonymous quantization
Information Sciences: an International Journal
ICTAC'12 Proceedings of the 9th international conference on Theoretical Aspects of Computing
A probabilistic hybrid logic for sanitized information systems
SUM'12 Proceedings of the 6th international conference on Scalable Uncertainty Management
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
t-Plausibility: Generalizing Words to Desensitize Text
Transactions on Data Privacy
Privacy by design: a formal framework for the analysis of architectural choices
Proceedings of the third ACM conference on Data and application security and privacy
Low Dimensional Data Privacy Preservation Using Multi Layer Artificial Neural Network
International Journal of Intelligent Information Technologies
Protecting User Privacy Better with Query l-Diversity
International Journal of Information Security and Privacy
Towards metrics-driven adaptive security management in e-health IoT applications
Proceedings of the 7th International Conference on Body Area Networks
A propagation model for provenance views of public/private workflows
Proceedings of the 16th International Conference on Database Theory
Lightweight privacy-preserving peer-to-peer data integration
Proceedings of the VLDB Endowment
Testing the lipschitz property over product distributions with applications to data privacy
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Efficient and accurate strategies for differentially-private sliding window queries
Proceedings of the 16th International Conference on Extending Database Technology
Privacy protection in personalized web search: a peer group-based approach
SBP'13 Proceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction
Re-identification of Smart Meter data
Personal and Ubiquitous Computing
Class-Restricted Clustering and Microperturbation for Data Privacy
Management Science
Utility-maximizing event stream suppression
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
SplitX: high-performance private analytics
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Developing privacy solutions for sharing and analysing healthcare data
International Journal of Business Information Systems
GASNA: greedy algorithm for social network anonymization
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Semantic trajectories modeling and analysis
ACM Computing Surveys (CSUR)
An efficient and robust privacy protection technique for massive streaming choice-based information
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Incremental processing and indexing for k, e-anonymisation
International Journal of Information and Computer Security
Membership privacy: a unifying framework for privacy definitions
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
The hardness of (ε, m)-anonymity
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
Privacy vulnerability of published anonymous mobility traces
IEEE/ACM Transactions on Networking (TON)
Incorporating Privacy into the Undergraduate Curriculum
Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference
Using safety constraint for transactional dataset anonymization
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Modeling and Respecting Privacy Specification when Composing DaaS Services*
International Journal of Web Services Research
Efficient Time-Stamped Event Sequence Anonymization
ACM Transactions on the Web (TWEB)
de-linkability: a privacy-preserving constraint for safely outsourcing multimedia documents
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
SPARSI: partitioning sensitive data amongst multiple adversaries
Proceedings of the VLDB Endowment
Mining frequent patterns with differential privacy
Proceedings of the VLDB Endowment
Improving accuracy of classification models induced from anonymized datasets
Information Sciences: an International Journal
The l-Diversity problem: Tractability and approximability
Theoretical Computer Science
MAGE: A semantics retaining K-anonymization method for mixed data
Knowledge-Based Systems
A near-optimal algorithm for differentially-private principal components
The Journal of Machine Learning Research
Measuring the privacy of user profiles in personalized information systems
Future Generation Computer Systems
Modeling and preventing inferences from sensitive value distributions in data release
Journal of Computer Security - STM'10
Journal of Computer Security
Hi-index | 0.01 |
We present MiniCount, the first efficient sound and complete algorithm for finding maximally contained rewritings of conjunctive queries with count, using conjunctive views with count and conjunctive views without aggregation. An efficient and scalable ...