Bradley Malin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

16 Francesco Bonchi, Elena Ferrari, Bradley Malin, Yücel Saygin: Privacy, Security, and Trust in KDD, First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers Springer 2008
15EEMurat Kantarcioglu, Wei Jiang, Bradley Malin: A Privacy-Preserving Framework for Integrating Person-Specific Databases. Privacy in Statistical Databases 2008: 298-314
14EEDino Pedreschi, Francesco Bonchi, Franco Turini, Vassilios S. Verykios, Maurizio Atzori, Bradley Malin, Bart Moelans, Yücel Saygin: Privacy Protection: Regulations and Technologies, Opportunities and Threats. Mobility, Data Mining and Privacy 2008: 101-119
13EEBradley Malin: k-Unlinkability: A privacy protection model for distributed data. Data Knowl. Eng. 64(1): 294-311 (2008)
12EEFrancesco Bonchi, Bradley Malin, Yücel Saygin: Recent advances in preserving privacy when mining data. Data Knowl. Eng. 65(1): 1-4 (2008)
11EEMurat Kantarcioglu, Wei Jiang, Ying Liu, Bradley Malin: A Cryptographic Approach to Securely Share and Query Genomic Sequences. IEEE Transactions on Information Technology in Biomedicine 12(5): 606-617 (2008)
10EEÁkos Lédeczi, Ruth Breu, Bradley Malin, Janos Sztipanovits: First International Workshop on the Model-Based Design of Trustworthy Health Information Systems. MoDELS Workshops 2007: 115-117
9EEBradley Malin: A computational model to protect patient data from location-based re-identification. Artificial Intelligence in Medicine 40(3): 223-239 (2007)
8EEFrancesco Bonchi, Elena Ferrari, Bradley Malin, Yücel Saygin: PinKDD'07: privacy, security, and trust in KDD post-workshop report. SIGKDD Explorations 9(2): 93-95 (2007)
7EEBradley Malin, Latanya Sweeney: Composition and Disclosure of Unlinkable Distributed Databases. ICDE 2006: 118
6EEBradley Malin, Edoardo Airoldi: The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment. Privacy Enhancing Technologies 2006: 413-429
5EEBradley Malin, Edoardo Airoldi, Samuel Edoho-Eket, Yiheng Li: Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants. ICDE 2005: 533-544
4EERalph Gross, Edoardo Airoldi, Bradley Malin, Latanya Sweeney: Integrating Utility into Face De-identification. Privacy Enhancing Technologies 2005: 227-242
3EEElaine M. Newton, Latanya Sweeney, Bradley Malin: Preserving Privacy by De-Identifying Face Images. IEEE Trans. Knowl. Data Eng. 17(2): 232-243 (2005)
2EEBradley Malin, Latanya Sweeney: How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems. Journal of Biomedical Informatics 37(3): 179-192 (2004)
1EEBradley Malin, Latanya Sweeney: Inferring Genotype from Clinical Phenotype through a Knowledge Based Algorithm. Pacific Symposium on Biocomputing 2002: 41-52

Coauthor Index

1Edoardo Airoldi [4] [5] [6]
2Maurizio Atzori [14]
3Francesco Bonchi [8] [12] [14] [16]
4Ruth Breu [10]
5Samuel Edoho-Eket [5]
6Elena Ferrari [8] [16]
7Ralph Gross [4]
8Wei Jiang [11] [15]
9Murat Kantarcioglu [11] [15]
10Ákos Lédeczi [10]
11Yiheng Li [5]
12Ying Liu [11]
13Bart Moelans [14]
14Elaine M. Newton [3]
15Dino Pedreschi [14]
16Yücel Saygin [8] [12] [14] [16]
17Latanya Sweeney [1] [2] [3] [4] [7]
18Janos Sztipanovits [10]
19Franco Turini [14]
20Vassilios S. Verykios [14]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)