Attacks on privacy and deFinetti's theorem
- 29 June 2009
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 32 references indexed in Scilit:
- Resisting structural re-identification in anonymized social networksProceedings of the VLDB Endowment, 2008
- Information Leakage in Optimal Anonymized and Diversified DataLecture Notes in Computer Science, 2008
- Protecting data privacy through hard-to-reverse negative databasesInternational Journal of Information Security, 2007
- On anonymizing query logs via token-based hashingPublished by Association for Computing Machinery (ACM) ,2007
- Wherefore art thou r3579x?Published by Association for Computing Machinery (ACM) ,2007
- L -diversityACM Transactions on Knowledge Discovery From Data, 2007
- Privacy leakage in multi-relational databases: a semi-supervised learning perspectiveThe VLDB Journal, 2006
- Differential PrivacyLecture Notes in Computer Science, 2006
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Security of random data perturbation methodsACM Transactions on Database Systems, 1999