메뉴 건너뛰기




Volumn 11, Issue 3, 2007, Pages 345-368

Handicapping attacker's confidence: An alternative to κ - Anonymization

Author keywords

Classification; Data mining; Data sharing; Privacy protection; Sensitive inference; anonymity

Indexed keywords

CLASSIFICATION (OF INFORMATION); DATA SHARING; METADATA; PRIVACY BY DESIGN;

EID: 34147125465     PISSN: 02191377     EISSN: 02193116     Source Type: Journal    
DOI: 10.1007/s10115-006-0035-5     Document Type: Article
Times cited : (95)

References (22)
  • 3
    • 0034497773 scopus 로고    scopus 로고
    • Using sample size to limit exposure to data mining
    • Clifton C (2000) Using sample size to limit exposure to data mining. J Comput Secur 8(4):281-307
    • (2000) J Comput Secur , vol.8 , Issue.4 , pp. 281-307
    • Clifton, C.1
  • 5
    • 0000082189 scopus 로고
    • Suppression methodology and statistical disclosure control
    • Cox LH (1980) Suppression methodology and statistical disclosure control. J Am Stat Assoc, Theory Method Sect 75:377-385
    • (1980) J Am Stat Assoc, Theory Method Sect , vol.75 , pp. 377-385
    • Cox, L.H.1
  • 7
    • 12244265258 scopus 로고    scopus 로고
    • The inference problem: A survey
    • Farkas C, Jajodia S (2003) The inference problem: A survey. SIGKDD Explorat 4(2):6-11
    • (2003) SIGKDD Explorat , vol.4 , Issue.2 , pp. 6-11
    • Farkas, C.1    Jajodia, S.2
  • 9
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • In: Edmonton, Alberta, Canada
    • Iyengar VS (2002) Transforming data to satisfy privacy constraints. In: Proceedings of the 8th ACM SIGKDD, Edmonton, Alberta, Canada, pp 279-288
    • (2002) Proceedings of the 8th ACM SIGKDD , pp. 279-288
    • Iyengar, V.S.1
  • 15
    • 0003500248 scopus 로고
    • C4.5: Programs for machine learning
    • Morgan Kaufmann
    • Quinlan JR (1993) C4.5: Programs for machine learning. Morgan Kaufmann
    • (1993)
    • Quinlan, J.R.1
  • 16
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression. Technical report SRI-CSL-98-04, SRI Computer Science Laboratory
    • (1998) Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory
    • Samarati, P.1    Sweeney, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.