![]() A privacy-preserving classification mining algorithm. Weiping Ge, Wei Wang, Xiaorong Li, and Baile Shi. In Proceedings of the 2000 ACM SIGMOD international conference on Management of data (SIGMOD ′00). Nabar, Shubha U and Kenthapadi, Krishnaram and Mishra, Nina and Motwani, Rajeev, 2008, A Survey of Query Auditing Techniques for Data Privacy, Privacy-Preserving Data, Springer US, pages: 415-431. Dasseni, 2004, Association rule hiding, in IEEE Transactions on Knowledge and Data Engineering, vol. Microsoft differential privacy for everyone. ![]() Springer-Verlag, Berlin, Heidelberg, 1–12. In Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II (ICALP′06), Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.), Vol. 2015, Article 1 (January 2016), 1 pages.Ĭynthia Dwork. A review of differential privacy in individual data release. NinghuiLi, Tiancheng Li, Suresh Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and ℓ -Diversity, 2007 IEEE 23rd International Conference on Data Engineering, 15–20 April 2007, Istanbul, Turkey.Īpple announced that they will be using a technique called “Differential Privacy” (henceforth: DP) to improve the privacy of their data collection practices 2016. ACM Transactions on Knowledge Discovery From Data. Machanavajjhala, Ashwin & Gehrke, Johannes & Kifer, Daniel & Venkitasubramaniam, Muthuramakrishnan. Vinay, Privacy Protection: p-Sensitive k-Anonymity Property, 22nd International Conference on Data Engineering Workshops (ICDEW’06), Atlanta, GA, USA, 2006, pp. Shmatikov, Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), Oakland, CA, 2008, pp. Hua, Ming and Pei, Jian, 2008, A Survey of Utility-based Privacy-Preserving Data Transformation Methods, Privacy-Preserving Data Mining: Models and Algorithms, Springer US, pages:207-237Ī. Ramakrishnan, Mondrian Multidimensional K-Anonymity, 22nd International Conference on Data Engineering (ICDE′ 06), 2006, pp. Pierangela Samarati and Latanya Sweeney, Protecting Privacy when Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression, 1998. ![]() ![]() k-anonymity: a model for protecting privacy. Kantarcioglu, Murat, 2008, A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data, Privacy-Preserving Data Mining: Models and Algorithms, Springer US, Pages: 313-335 ACM, New York, NY, USA, Article 26, 11 pages. In Proceedings of the 27th International Conference on Scientific and Statistical Database Management (SSDBM ′15), Amarnath Gupta and Susan Rathbun (Eds.). MapReduce: simplified data processing on large clusters. Zhang et al., Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud, in IEEE Transactions on Computers, vol. Hadoop: Toddler Talk Provides Big Data Name Bertino, Elisa and Lin, Dan and Jiang, Wei, 2008 A Survey of Quantification of Privacy Preserving Data Mining Algorithms, Privacy-Preserving Data Mining: Models and Algorithms, Springer US, 183-205. ![]()
0 Comments
Leave a Reply. |