메뉴 건너뛰기




Volumn , Issue , 2006, Pages 229-240

Personalized privacy preservation

Author keywords

K anonymity; Privacy preservation

Indexed keywords

GENERALIZATION FRAMEWORK; K-ANONYMITY; PRIVACY PRESERVATION;

EID: 34250680246     PISSN: 07308078     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1142473.1142500     Document Type: Conference Paper
Times cited : (479)

References (19)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. R. Adam and J. C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21(4):515-556, 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Worthmann, J.C.2
  • 2
    • 33745629638 scopus 로고    scopus 로고
    • On k-anonymity and the curse of dimensionality
    • C. C. Aggarwal. On k-anonymity and the curse of dimensionality. In VLDB, pages 901-909, 2005.
    • (2005) VLDB , pp. 901-909
    • Aggarwal, C.C.1
  • 4
    • 29844443821 scopus 로고    scopus 로고
    • Privacy preserving olap
    • R. Agrawal, R. Srikant, and D. Thomas. Privacy preserving olap. In SIGMOD, pages 251-262, 2005.
    • (2005) SIGMOD , pp. 251-262
    • Agrawal, R.1    Srikant, R.2    Thomas, D.3
  • 5
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, pages 217-228, 2005.
    • (2005) ICDE , pp. 217-228
    • Bayardo, R.1    Agrawal, R.2
  • 6
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
    • (2003) PODS , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 7
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In ICDE, pages 205-216, 2005.
    • (2005) ICDE , pp. 205-216
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 8
    • 0242625276 scopus 로고    scopus 로고
    • Transforming data to satisfy privacy constraints
    • V. Iyengar. Transforming data to satisfy privacy constraints. In SIGKDD, pages 279-288, 2002.
    • (2002) SIGKDD , pp. 279-288
    • Iyengar, V.1
  • 9
    • 29844444250 scopus 로고    scopus 로고
    • Incognito: Efficient full-domain k-anonymity
    • K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In SIGMOD, pages 49-60, 2005.
    • (2005) SIGMOD , pp. 49-60
    • LeFevre, K.1    DeWitt, D.J.2    Ramakrishnan, R.3
  • 12
    • 3142691086 scopus 로고    scopus 로고
    • On the complexity of optimal k-anonymity
    • A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In PODS, pages 223-228, 2004.
    • (2004) PODS , pp. 223-228
    • Meyerson, A.1    Williams, R.2
  • 13
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • P. Samarati. Protecting respondents' identities in microdata release. TKDE, 13(6): 1010-1027, 2001.
    • (2001) TKDE , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 14
    • 0030157416 scopus 로고    scopus 로고
    • Mining quantitative association rules in large relational tables
    • R. Srikant and R. Agrawal. Mining quantitative association rules in large relational tables. In SIGMOD, pages 1-12, 1996.
    • (1996) SIGMOD , pp. 1-12
    • Srikant, R.1    Agrawal, R.2
  • 17
    • 19544380211 scopus 로고    scopus 로고
    • Bottom-up generalization: A data mining solution to privacy protection
    • K. Wang, P. S. Yu, and S. Chakraborty. Bottom-up generalization: A data mining solution to privacy protection. In ICDM, pages 249-256, 2004.
    • (2004) ICDM , pp. 249-256
    • Wang, K.1    Yu, P.S.2    Chakraborty, S.3
  • 18
    • 33745599656 scopus 로고    scopus 로고
    • Checking for k-anonymity violation by views
    • C. Yao, X. S. Wang, and S. Jajodia. Checking for k-anonymity violation by views. In VLDB, pages 910-921, 2005.
    • (2005) VLDB , pp. 910-921
    • Yao, C.1    Wang, X.S.2    Jajodia, S.3
  • 19
    • 33244463520 scopus 로고    scopus 로고
    • Privacy-enhancing k-anonymization of customer data
    • S. Zhong, Z. Yang, and R. N. Wright. Privacy-enhancing k-anonymization of customer data. In PODS, pages 139-147, 2005.
    • (2005) PODS , pp. 139-147
    • Zhong, S.1    Yang, Z.2    Wright, R.N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.