Adam, N.R., Wortmann, J.C.: Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys 21(4), 515–556 (1989)
CrossRef
Google Scholar
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proc, A.S. (ed.) International Conference on Management of Data, pp. 439–450 (2000)
Google Scholar
Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: The SuLQ framework. In: Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, June 2005, pp. 128–138 (2005)
Google Scholar
Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H.: Toward privacy in public databases. In: Proceedings of the 2nd Theory of Cryptography Conference, pp. 363–385 (2005)
Google Scholar
Chawla, S., Dwork, C., McSherry, F., Talwar, K.: On the utility of privacy-preserving histograms. In: Proceedings of the 21st Conference on Uncertainty in Artificial Intelligence (2005)
Google Scholar
Dalenius, T.: Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, 222–429 (1977)
Google Scholar
Denning, D.E.: Secure statistical databases with random sample queries. ACM Transactions on Database Systems 5(3), 291–315 (1980)
MATH
CrossRef
Google Scholar
Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 202–210 (2003)
Google Scholar
Dobkin, D., Jones, A.K., Lipton, R.J.: Secure databases: Protection against user influence. ACM Trans. Database Syst. 4 1, 97–106 (1979)
CrossRef
Google Scholar
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
CrossRef
Google Scholar
Dodis, Y., Smith, A.: Correcting Errors Without Leaking Partial Information. In: Proceedings of the 37th ACM Symposium on Theory of Computing, pp. 654–663 (2005)
Google Scholar
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of the 3rd Theory of Cryptography Conference, pp. 265–284 (2006)
Google Scholar
Dwork, C., Nissim, K.: Privacy-preserving datamining on vertically partitioned databases. In: Advances in Cryptology: Proceedings of Crypto, pp. 528–544 (2004)
Google Scholar
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, June 2003, pp. 211–222 (2003)
Google Scholar
Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences 28, 270–299 (1984); prelminary version appeared in Proceedings 14th Annual ACM Symposium on Theory of Computing
MATH
CrossRef
MathSciNet
Google Scholar
Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43–52 (1996)
MATH
CrossRef
MathSciNet
Google Scholar
Shaltiel, R.: Recent developments in explicit constructions of extractors. Bulletin of the EATCS 77, 67–95 (2002)
MATH
MathSciNet
Google Scholar
Sweeney, L.: Weaving technology and policy together to maintain confidentiality. J. of Law Med Ethics 25(2-3), 98–110 (1997)
CrossRef
Google Scholar
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5), 571–588 (2002)
MATH
CrossRef
MathSciNet
Google Scholar