메뉴 건너뛰기




Volumn , Issue , 2007, Pages 116-125

Aggregate query answering on anonymized tables

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; ALGORITHMS; DATA PRIVACY; INFORMATION DISSEMINATION;

EID: 34548710709     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2007.367857     Document Type: Conference Paper
Times cited : (292)

References (14)
  • 1
    • 0024914229 scopus 로고
    • Security-Control Methods for Statistical Databases: A Comparative Study
    • N. Adam, and J. Wortman. Security-Control Methods for Statistical Databases: A Comparative Study. ACM Computing Surveys, 21(4), 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4
    • Adam, N.1    Wortman, J.2
  • 2
    • 34548726867 scopus 로고    scopus 로고
    • G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. P. raby, D. Thomas, and A. Zhu. k-Anonymity: Algorithms and Hardness. Technical report, Stanford University, 2004.
    • G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. P. raby, D. Thomas, and A. Zhu. k-Anonymity: Algorithms and Hardness. Technical report, Stanford University, 2004.
  • 5
    • 34548746451 scopus 로고    scopus 로고
    • Aggregate Query Answering on Anonymized Tables
    • Technical Report TR-2006-16, North Carolina State University
    • N. Koudas, D. Srivastava, T. Yu, and Q. Zhang. Aggregate Query Answering on Anonymized Tables. Technical Report TR-2006-16, North Carolina State University, 2006.
    • (2006)
    • Koudas, N.1    Srivastava, D.2    Yu, T.3    Zhang, Q.4
  • 6
    • 29844444250 scopus 로고    scopus 로고
    • K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito -Efficient Full-Domain K-Anonymity. In In Proceedings of ACM SIGMOD Conference, Baltimore, MD, June 2005.
    • K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito -Efficient Full-Domain K-Anonymity. In In Proceedings of ACM SIGMOD Conference, Baltimore, MD, June 2005.
  • 7
    • 34548805858 scopus 로고    scopus 로고
    • N. Li, T. Li, and S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity. In Proceedings of IEEE International Conference on Data Engineering, 2007.
    • N. Li, T. Li, and S. Venkatasubramanian. t-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity. In Proceedings of IEEE International Conference on Data Engineering, 2007.
  • 9
    • 10944249990 scopus 로고    scopus 로고
    • Controlled Data-Swapping Techniques for Masking Public Use Microdata Sets
    • RR 96-04, US Bureau of Census
    • R. Moore. Controlled Data-Swapping Techniques for Masking Public Use Microdata Sets. Technical Report Statistical Research Division Report Series, RR 96-04, US Bureau of Census, 1996.
    • (1996) Technical Report Statistical Research Division Report Series
    • Moore, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.