|
[1]R. Agrawal, A. Evfimievski, and R. Srikant, Information sharing across private databases, In Proceedings of 2003 ACM SIGMOD International Conference on Management of Data, pages 86-97, ACM Press, 2003. [2]R. Agrawal and E. Terzi, On honesty in sovereign information sharing, In Proceedings of the 10th International Conference on Extending Database Technology (EDBT), pages 240-256, 2006. [3]M. J. Atallah, F. Kerschbaum, and W. Du, Secure and private sequence comparisons, In Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, pages 39-44, 2003. [4]E. Bertino and R. Sandhu, Database security: Concepts, approaches, and challenges, IEEE Transactions on Dependable and Secure Computing, Vol. 2, pages 2-19, 2005. [5]M. Bilenko, B. Kamath, and R. J. Mooney, Adaptive blocking: Learning to scale up record linkage, In IEEE International Conference on Data Mining (ICDM’06), pages 87–96, Hong Kong, 2006. [6]C. Clifton, M. Kantarcioglu, A. Doan, G. Schadow, J. Vaidya, A. Elmagarmid, and D. Suciu, Privacy-preserving data integration and sharing, In Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, pages 19-26, 2004. [7]W. W. Cohen, P. Ravikumar, and S. E. Fienberg, A comparison of string distance metrics for name-matching tasks, In IIWEB, pages 73-78, 2003. [8]W. W. Cohen, P. Ravikumar, and S. E. Fienberg, A comparison of string metrics for matching names and records, KDD Workshop on Data Cleaning and Object Consolidation, 2003. [9]W. Du and M. J. Atallah, Protocols for secure remote database access with approximate matching, In 7th ACM Conference on Computer and Communications Security (ACMCCS 2000), the First Workshop on Security and Privacy in E-Commerce, Athens, Greece, November 2000. [10]K. Elmagarmid, P. G. Ipeirotis, and V. S. Verykios, Duplicate record detection: A survey, IEEE Transactions on Knowledge and Data Engineering, Vol. 19, No. 1, pages 1-16, 2007. [11]M. J. Freedman, K. Nissim, and B. Pinkas, Efficient private matching and set intersection, In Proceedings of Eurocrypt 2004, Vol. 3027 of LNCS, pages 1-19, Springer-Verlag, May 2004. [12]K. Frikken, Privacy-preserving set union, Lecture Notes in Computer Science, Vol. 4521, pages 237-252, 2007. [13]K. Goiser and P. Christen, Towards automated record linkage, In Proceedings of the fifth Australasian Conference on Data Mining and Analytics, Vol. 61, pages 23–31, 2006. [14]R. Hjaltason, and H. Samet, Properties of embedding methods for similarity searching in metric spaces, IEEE Transactions on Pattern Analysis and Machine Intelligence 25, No. 5, pages 530-549, May 2003. [15]L. Kissner and D. Song, Private and threshold set-intersection, Technical Report CMU-CS-05-113, Carnegie Mellon University, 2005. [16]L. Kissner and D. Song, Privacy-preserving set operations, In Advances in Cryptology - Crypto 2005, LNCS Vol. 3621, pages 241-257, Springer-Verlag, 2005. [17]N. Koudas, S. Sarawagi, and D. Srivastava, Record linkage: Similarity measures and algorithms, SIGMOD 2006, pages 802-803, 2006. [18]Al-Lawati, D. Lee, and P. McDaniel, Blocking aware private record linkage, In Proceedings of the ACM SIGMOD Workshop on Information Quality in Information, pages 59-68, 2005. [19]J. Liang, C. Li, and S. Mehrotra, Efficient record linkage in large data sets, 8th Annual International Conference on Database Systems for Advanced Applications, DASFAA 2003, pages 26-28, March 2003. [20]M. O’Keefe, M. Yung, L. Gu, and R. Baxter, Privacy-preserving data linkage protocols, In WPES’04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pages 94–102, Washington DC, 2004. [21]E. Rahm, and P.A. Bernstein, A survey of approaches to automatic schema matching, VLDB Journal 10 (2001), No. 4, pages 334-350, 2001. [22]P. Ravikumar, W. Cohen, and S. Fienberg, A secure protocol for computing string distance metrics, In Workshop on Privacy and Security Aspects of Data Mining, Brighton, UK, November 1 2004. [23]M. Scannapieco, I. Figotin, E. Bertino, and A. Elmagarmid, Privacy preserving schema and data matching, In Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, pages 653-664, June 11-14, 2007, Beijing, China. [24]S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, and Y. Saygin, State-of-the-art in privacy preserving data mining, SIGMOD Record, Vol. 33, No. 1, pages 50–57, March 2004. [25]S. Yan, D. Lee, M. Y. Kan, and L. C. Giles, Adaptive sorted neighborhood methods for efficient record linkage, In Proceedings of the 7th ACM/IEEE Joint Conference on Digital Libraries, pages 185-194, 2007. [26]N. Zhang and W. Zhao, Distributed privacy preserving information sharing, In VLDB ’05: Proceedings of the 31st International Conference on Very Large Data Bases, pages 889-900, VLDB Endowment, 2005.
|