메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 414-423

Anonymizing sequential releases

Author keywords

Classification; Generalization; K anonymity; Privacy; Sequential release

Indexed keywords

DATABASE SYSTEMS; IDENTIFICATION (CONTROL SYSTEMS); LOGIC DESIGN; PROBLEM SOLVING; SEQUENTIAL MACHINES;

EID: 33749581232     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1150402.1150449     Document Type: Conference Paper
Times cited : (201)

References (26)
  • 2
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In IEEE ICDE, pages 217-228, 2005.
    • (2005) IEEE ICDE , pp. 217-228
    • Bayardo, R.1    Agrawal, R.2
  • 3
    • 0034497773 scopus 로고    scopus 로고
    • Using sample size to limit exposure to data mining
    • C. Clifton. Using sample size to limit exposure to data mining. Journal of Computer Security, 8(4):281-307, 2000.
    • (2000) Journal of Computer Security , vol.8 , Issue.4 , pp. 281-307
    • Clifton, C.1
  • 5
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • April
    • B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In IEEE ICDE, pages 205-216, April 2005.
    • (2005) IEEE ICDE , pp. 205-216
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 6
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • V. S. Iyengar. Transforming data to satisfy privacy constraints. In ACM SIGKDD, pages 279-288, 2002.
    • (2002) ACM SIGKDD , pp. 279-288
    • Iyengar, V.S.1
  • 7
    • 34250673244 scopus 로고    scopus 로고
    • Injecting utility into anonymized datasets
    • Chicago, IL, June
    • D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In ACM SIGMOD, Chicago, IL, June 2006.
    • (2006) ACM SIGMOD
    • Kifer, D.1    Gehrke, J.2
  • 11
    • 2942522665 scopus 로고    scopus 로고
    • How to protect genomic data privacy in a distributed network
    • B. Malin and L. Sweeney. How to protect genomic data privacy in a distributed network. In Journal of Biomed Info, 37(3): 179-192, 2004.
    • (2004) Journal of Biomed Info , vol.37 , Issue.3 , pp. 179-192
    • Malin, B.1    Sweeney, L.2
  • 12
    • 3142691086 scopus 로고    scopus 로고
    • On the complexity of optimal k-anonymity
    • A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In PODS, 2004.
    • (2004) PODS
    • Meyerson, A.1    Williams, R.2
  • 13
    • 3142686877 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In ACM SIGMOD, 2004.
    • (2004) ACM SIGMOD
    • Miklau, G.1    Suciu, D.2
  • 16
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • P. Samarati. Protecting respondents' identities in microdata release. IEEE TKDE, 13(6):1010-1027, 2001.
    • (2001) IEEE TKDE , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 17
    • 4344559647 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • May
    • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In IEEE Symposium on Research in Security and Privacy, May 1998.
    • (1998) IEEE Symposium on Research in Security and Privacy
    • Samarati, P.1    Sweeney, L.2
  • 18
  • 20
    • 33749559842 scopus 로고    scopus 로고
    • Integrating private databases for data analysis
    • May
    • K. Wang, B. C. M. Fung, and G. Dong. Integrating private databases for data analysis. In IEEE ISI, May 2005.
    • (2005) IEEE ISI
    • Wang, K.1    Fung, B.C.M.2    Dong, G.3
  • 21
    • 33749546201 scopus 로고    scopus 로고
    • Template-based privacy preservation in classification problems
    • November
    • K. Wang, B. C. M. Fung, and P. S. Yu. Template-based privacy preservation in classification problems. In IEEE ICDM, pages 466-473, November 2005.
    • (2005) IEEE ICDM , pp. 466-473
    • Wang, K.1    Fung, B.C.M.2    Yu, P.S.3
  • 23
    • 33749580222 scopus 로고    scopus 로고
    • Bottom-up generalization: A data mining solution to privacy protection
    • November
    • K. Wang, P. S. Yu, and S. Chakraborty. Bottom-up generalization: A data mining solution to privacy protection. In IEEE ICDM, November 2004.
    • (2004) IEEE ICDM
    • Wang, K.1    Yu, P.S.2    Chakraborty, S.3
  • 24
    • 33749571958 scopus 로고    scopus 로고
    • (α,k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing
    • R. C. W. Wong, J. Li., A. W. C. Fu, and K. Wang. (α,k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In ACM SIGKDD, 2006.
    • (2006) ACM SIGKDD
    • Wong, R.C.W.1    Li, J.2    Fu, A.W.C.3    Wang, K.4
  • 25
    • 34250680246 scopus 로고    scopus 로고
    • Personalized privacy preservation
    • June
    • X. Xiao and Y. Tao. Personalized privacy preservation. In ACM SIGMOD, June 2006.
    • (2006) ACM SIGMOD
    • Xiao, X.1    Tao, Y.2
  • 26
    • 33745599656 scopus 로고    scopus 로고
    • Checking for k-anonymity violation by views
    • C. Yao, X. S. Wang, and S. Jajodia. Checking for k-anonymity violation by views. In VLDB, 2005.
    • (2005) VLDB
    • Yao, C.1    Wang, X.S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.