Supplemental Material
- Adam, N.R., Wortmann, J. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv. 21 (1989), 515--556. Google ScholarDigital Library
- Blum, A., Dwork, C., McSherry, F., Nissim, K. Practical privacy: The SuLQ framework. In Proceedings of the 24th ACM Symposium on Principles of Database Systems (2005), 128--138. Google ScholarDigital Library
- Blum, A., Ligett, K., Roth, A. A learning theory approach to non-interactive database privacy. In Proceedings of the 40th ACM Symposium on Theory of Computing (2008), 609--618. Google ScholarDigital Library
- Denning, D.E. Secure statistical databases with random sample queries. ACM Trans. Database Syst. 5 (1980), 291--315. Google ScholarDigital Library
- Dinur, I., Nissim, K. Revealing information while preserving privacy. In Proceedings of the 22nd ACM Symposium on Principles of Database Systems (2003), 202--210. Google ScholarDigital Library
- Dwork, C. Differential privacy. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP) (2) (2006), 1--12. Google ScholarDigital Library
- Dwork, C., McSherry, F., Nissim, K., Smith, A. Calibrating noise to sensitivity in private data analysis. In Proceedings of the 3rd Theory of Cryptography Conference (2006), 265--284. Google ScholarDigital Library
- Dwork, C., McSherry, F., Talwar, K. The price of privacy and the limits of lp decoding. In Proceedings of the 39th ACM Symposium on Theory of Computing (2007), 85--94. Google ScholarDigital Library
- Dwork, C. Naor, M. On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. J. Privacy Confidentiality 2 (2010). Available at: http://repository.cmu.edu/jpc/vol2/iss1/8.Google Scholar
- Dwork, C., Naor, M., Pitassi, T., Rothblum, G., Yekhanin, S. Pan-private streaming algorithms. In Proceedings of the 1st Symposium on Innovations in Computer Science (2010).Google Scholar
- Dwork, C., Naor, M., Reingold, O., Rothblum, G., Vadhan, S. When and how can privacy-preserving data release be done efficiently? In Proceedings of the 41st ACM Symposium on Theory of Computing (2009), 381--390. Google ScholarDigital Library
- Dwork, C., Nissim, K. Privacy-preserving datamining on vertically partitioned databases. In Advances in Cryptology---CRYPTO'04 (2004), 528--544.Google Scholar
- Goldwasser, S., Micali, S. Probabilistic encryption. JCSS 28 (1984), 270--299.Google ScholarCross Ref
- Hardt, M., Talwar, K. On the geometry of differential privacy, (2009). In Proceedings of the 42nd ACM Symposium on Theory of Computing (2010), 705--714. Google ScholarDigital Library
- Kenthapadi K., Mishra, N., Nissim, K. Simulatable auditing. In Proceedings of the 24th ACM Symposium on Principles of Database Systems (2005), 118--127. Google ScholarDigital Library
- Kleinberg, J., Papadimitriou, C., Raghavan, P. Auditing boolean attributes. In Proceedings of the 19th ACM Symposium on Principles of Database Systems (2000), 86--91. Google ScholarDigital Library
- Kumar, R., Novak, J., Pang, B., Tomkins, A. On anonymizing query logs via token-based hashing. In Proceedings of the WWW 2007 (2007), 629--638. Google ScholarDigital Library
- McSherry, F. Privacy integrated queries (codebase). Available on Microsoft Research downloads website. See also Proceedings of SIGMOD (2009), 19--30. Google ScholarDigital Library
- McSherry, F., Talwar, K. Mechanism design via differential privacy. In Proceedings of the 48th Annual Symposium on Foundations of Computer Science (2007). Google ScholarDigital Library
- Mironov, I., Pandey, O., Reingold, O., Vadhan, S. Computational differential privacy. In Advances in Cryptology---CRYPTO'09 (2009), 126--142. Google ScholarDigital Library
- Rubin, D. Discussion: Statistical disclosure limitation. J. Official Statist. 9 (1993), 462--468.Google Scholar
- Sweeney, L. Weaving technology and policy together to maintain confidentiality. J. Law Med. Ethics 25 (1997), 98--110.Google ScholarCross Ref
- Warner, S. Randomized response: a survey technique for eliminating evasive answer bias. JASA (1965), 63--69.Google Scholar
Index Terms
- A firm foundation for private data analysis
Recommendations
A differentially private algorithm for location data release
The rise of mobile technologies in recent years has led to large volumes of location information, which are valuable resources for knowledge discovery such as travel patterns mining and traffic analysis. However, location dataset has been confronted ...
Comments