Composition attacks and auxiliary information in data privacy
- 24 August 2008
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 265-273
- https://doi.org/10.1145/1401890.1401926
Abstract
No abstract availableKeywords
Other Versions
This publication has 32 references indexed in Scilit:
- L -diversityACM Transactions on Knowledge Discovery From Data, 2007
- Differential PrivacyLecture Notes in Computer Science, 2006
- Secure Anonymization for Incremental DatasetsLecture Notes in Computer Science, 2006
- When Random Sampling Preserves PrivacyLecture Notes in Computer Science, 2006
- Privacy-Preserving Datamining on Vertically Partitioned DatabasesLecture Notes in Computer Science, 2004
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Practical data-oriented microaggregation for statistical disclosure controlIEEE Transactions on Knowledge and Data Engineering, 2002
- Randomized Response, Statistical Disclosure Control and Misclassification: A ReviewPublished by JSTOR ,2002
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- Randomized Response: A Survey Technique for Eliminating Evasive Answer BiasJournal of the American Statistical Association, 1965