Kristen LeFevre

According to our database1, Kristen LeFevre authored at least 29 papers between 2004 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2013
Explaining accesses to electronic medical records using diagnosis information.
JAMIA, 2013

Self-Reported Social Network Behavior: Accuracy Predictors and Implications for the Privacy Paradox.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Look who I found: understanding the effects of sharing curated friend groups.
Proceedings of the Web Science 2012, 2012

The PViz comprehension tool for social network privacy settings.
Proceedings of the Symposium On Usable Privacy and Security, 2012

2011
Adversarial/External Knowledge (Privacy in the Presence of).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Hippocratic Database.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Explanation-Based Auditing.
PVLDB, 2011

Explanation-Based Auditing
CoRR, 2011

Do Query Optimizers Need to be SSD-aware?
Proceedings of the International Workshop on Accelerating Data Management Systems Using Modern Processor and Storage Architectures, 2011

enList: Automatically Simplifying Privacy Policies.
Proceedings of the Data Mining Workshops (ICDMW), 2011

2010
CRIUS: User-Friendly Database Design.
PVLDB, 2010

PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting.
PVLDB, 2010

Strategic Modeling of Information Sharing among Data Privacy Attackers.
Informatica (Slovenia), 2010

Privacy wizards for social networking sites.
Proceedings of the 19th International Conference on World Wide Web, 2010

GraSS: Graph Structure Summarization.
Proceedings of the SIAM International Conference on Data Mining, 2010

An online framework for publishing privacy-sensitive location traces.
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2010

Splash: ad-hoc querying of data and statistical models.
Proceedings of the EDBT 2010, 2010

A privacy recommendation wizard for users of social networking sites.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Adversarial-knowledge dimensions in data privacy.
VLDB J., 2009

Privacy-Preserving Data Publishing.
Foundations and Trends in Databases, 2009

PrivatePond: Outsourced Management of Web Corpuses.
Proceedings of the 12th International Workshop on the Web and Databases, 2009

Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

2008
Workload-aware anonymization techniques for large-scale datasets.
ACM Trans. Database Syst., 2008

2007
Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

2006
Workload-aware anonymization.
Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006

Mondrian Multidimensional K-Anonymity.
Proceedings of the 22nd International Conference on Data Engineering, 2006

2005
Incognito: Efficient Full-Domain K-Anonymity.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2005

2004
Limiting Disclosure in Hippocratic Databases.
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004

Managing Healthcare Data Hippocratically.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2004


  Loading...