메뉴 건너뛰기




Volumn 10, Issue 5, 2002, Pages 557-570

k-anonymity: A model for protecting privacy

Author keywords

Data anonymity; Data fusion; Data privacy; Privacy; Re identification

Indexed keywords

DATA PRIVACY; DATA STRUCTURES; INFORMATION THEORY; MATHEMATICAL MODELS;

EID: 0036811662     PISSN: 02184885     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0218488502001648     Document Type: Article
Times cited : (6903)

References (25)
  • 1
    • 0003206143 scopus 로고    scopus 로고
    • Uniqueness of simple demographics in the U.S. population
    • LIDAP-WP4. Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh, PA: Forthcoming book entitled
    • L. Sweeney, Uniqueness of Simple Demographics in the U.S. Population, LIDAP-WP4. Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh, PA: 2000. Forthcoming book entitled, The Identifiability of Data.
    • (2000) The Identifiability of Data
    • Sweeney, L.1
  • 2
    • 0011648788 scopus 로고    scopus 로고
    • Falls Church: National Association of Health Data Organizations, Oct.
    • National Association of Health Data Organizations, A Guide to State-Level Ambulatory Care Data Collection Activities (Falls Church: National Association of Health Data Organizations, Oct. 1996).
    • (1996) A Guide to State-Level Ambulatory Care Data Collection Activities
  • 4
    • 0011702436 scopus 로고    scopus 로고
    • City of Cambridge, Massachusetts. Cambridge: February
    • Cambridge Voters List Database. City of Cambridge, Massachusetts. Cambridge: February 1997.
    • (1997) Cambridge Voters List Database
  • 8
    • 84972531331 scopus 로고
    • Enhancing access to data while protecting confidentiality: Prospects for the future
    • May, as Invited Paper with Discussion
    • G. Duncan and R. Pearson. Enhancing access to data while protecting confidentiality: prospects for the future. Statistical Science, May, as Invited Paper with Discussion. 1991.
    • (1991) Statistical Science
    • Duncan, G.1    Pearson, R.2
  • 10
    • 0026367603 scopus 로고
    • Controlling FD and MVD inference in multilevel relational database systems
    • T. Su and G. Ozsoyoglu. Controlling FD and MVD inference in multilevel relational database systems. IEEE Transactions on Knowledge and Data Engineering, 3:474-485, 1991.
    • (1991) IEEE Transactions on Knowledge and Data Engineering , vol.3 , pp. 474-485
    • Su, T.1    Ozsoyoglu, G.2
  • 11
    • 84976785631 scopus 로고
    • Security and Inference in multilevel database and knowledge based systems
    • M. Morgenstern. Security and Inference in multilevel database and knowledge based systems. Proc. of the ACM SIGMOD Conference, pages 357-373, 1987.
    • (1987) Proc. of the ACM SIGMOD Conference , pp. 357-373
    • Morgenstern, M.1
  • 13
    • 0024663399 scopus 로고
    • Aggregation and inference: Facts and fallacies
    • Oakland, CA, May
    • T. Lunt. Aggregation and inference: Facts and fallacies. In Proc. of the IEEE Symposium on Security and Privacy, pages 102-109, Oakland, CA, May 1989.
    • (1989) Proc. of the IEEE Symposium on Security and Privacy , pp. 102-109
    • Lunt, T.1
  • 18
    • 0018442066 scopus 로고
    • Thetracker: A threat to statistical database security
    • March
    • D. Denning, P. Denning, and M. Schwartz. Thetracker: A threat to statistical database security. ACM Trans. on Database Systems, 4(1):76-96, March 1979.
    • (1979) ACM Trans. on Database Systems , vol.4 , Issue.1 , pp. 76-96
    • Denning, D.1    Denning, P.2    Schwartz, M.3
  • 19
    • 0011644227 scopus 로고
    • Microdata disclosure limitation in statistical databases: Query size and random sample query control
    • May 20-22, Oakland, California
    • G. Duncan and S. Mukherjee. Microdata disclosure limitation in statistical databases: query size and random sample query control. In Proc. of the 1991 IEEE Symposium on Research in Security and Privacy, May 20-22, Oakland, California. 1991.
    • (1991) Proc. of the 1991 IEEE Symposium on Research in Security and Privacy
    • Duncan, G.1    Mukherjee, S.2
  • 20
    • 0344024833 scopus 로고    scopus 로고
    • Guaranteeing anonymity when sharing medical data, the Datafly system
    • Washington, DC: Hanley & Belfus, Inc.
    • L. Sweeney. Guaranteeing anonymity when sharing medical data, the Datafly system. Proceedings, Journal of the American Medical Informatics Association. Washington, DC: Hanley & Belfus, Inc., 1997.
    • (1997) Proceedings, Journal of the American Medical Informatics Association
    • Sweeney, L.1
  • 22
    • 0011648511 scopus 로고    scopus 로고
    • Towards the optimal suppression of details when disclosing medical data, the use of sub-combination analysis
    • International Medical Informatics Association. Seoul, Korea. North-Holland
    • L. Sweeney. Towards the optimal suppression of details when disclosing medical data, the use of sub-combination analysis. Proceedings, MEDINFO 98. International Medical Informatics Association. Seoul, Korea. North-Holland, 1998.
    • (1998) Proceedings, MEDINFO 98
    • Sweeney, L.1
  • 24
    • 0000072558 scopus 로고
    • Finding a needle in a haystack-or identifying anonymous census record
    • T. Dalenius. Finding a needle in a haystack-or identifying anonymous census record. Journal of Official Statistics, 2(3):329-336, 1986.
    • (1986) Journal of Official Statistics , vol.2 , Issue.3 , pp. 329-336
    • Dalenius, T.1
  • 25
    • 0011644228 scopus 로고    scopus 로고
    • Computational data privacy protection
    • LIDAP-WP5. Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh, PA: Forthcoming book entitled
    • L. Sweeney, Computational Data Privacy Protection, LIDAP-WP5. Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh, PA: 2000. Forthcoming book entitled, A Primer on Providing Privacy in Data.
    • (2000) A Primer on Providing Privacy in Data
    • Sweeney, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.