|
Table of contents
Volume 5, Issue 1, April 2012
|
k-Concealment: An Alternative Model of k-Type Anonymity
Tamir Tassa, Arnon Mazza, Aristides Gionis
Transactions on Data Privacy 5:1 (2012) 189 - 222
Abstract, PDF
|
Utility-guided Clustering-based Transaction Data Anonymization
Aris Gkoulalas-Divanis, Grigorios Loukides
Transactions on Data Privacy 5:1 (2012) 223 - 251
Abstract, PDF
|
Distributing Data for Secure Database Services
Vignesh Ganapathy, Dilys Thomas, Tomas Feder, Hector Garcia-Molina, Rajeev Motwani
Transactions on Data Privacy 5:1 (2012) 253 - 272
Abstract, PDF
|
A Practical Differentially Private Random Decision Tree Classifier
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Rebecca N. Wright
Transactions on Data Privacy 5:1 (2012) 273 - 295
Abstract, PDF
|
Efficient Privacy Preserving Protocols for Similarity Join
Bilal Hawashin, Farshad Fotouhi, Traian Marius Truta, William Grosky
Transactions on Data Privacy 5:1 (2012) 297 - 331
Abstract, PDF
|
Mobile Systems Privacy: 'MobiPriv' A Robust System for Snapshot or Continuous Querying Location Based Mobile Systems
Leon Stenneth, Philip S. Yu
Transactions on Data Privacy 5:1 (2012) 333 - 376
Abstract, PDF
|