메뉴 건너뛰기




Volumn 65, Issue 1, 2008, Pages 22-39

Towards optimal k-anonymization

Author keywords

Anonymization; Generalization; Privacy

Indexed keywords

ALGORITHMS; INFORMATION DISSEMINATION; OPTIMAL CONTROL SYSTEMS; RESEARCH AND DEVELOPMENT MANAGEMENT;

EID: 39749201160     PISSN: 0169023X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.datak.2007.06.015     Document Type: Article
Times cited : (44)

References (21)
  • 1
    • 33745629638 scopus 로고    scopus 로고
    • C. Aggarwal, On k-anonymity and the curse of dimensionality, in: Proceedings of the 31st International Conference on Very Large Data Bases (VLDB), 2005.
    • C. Aggarwal, On k-anonymity and the curse of dimensionality, in: Proceedings of the 31st International Conference on Very Large Data Bases (VLDB), 2005.
  • 2
    • 39749115228 scopus 로고    scopus 로고
    • G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, A. Zhu, Anonymizing tables, in: Proceedings of International Conference on Database Theory (ICDT), 2005.
    • G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, A. Zhu, Anonymizing tables, in: Proceedings of International Conference on Database Theory (ICDT), 2005.
  • 3
    • 34250661905 scopus 로고    scopus 로고
    • G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, A. Zhu, Achieving anonymity via clustering, in: Proceedings of the 25th ACM Symposium on Principles of Database Systems (PODS), 2006.
    • G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, A. Zhu, Achieving anonymity via clustering, in: Proceedings of the 25th ACM Symposium on Principles of Database Systems (PODS), 2006.
  • 4
    • 28444449426 scopus 로고    scopus 로고
    • R. J. Bayardo, R. Agrawal, Data privacy through optimal k-anonymization, in: Proceedings of the 21st International Conference on Data Engineering (ICDE), 2005.
    • R. J. Bayardo, R. Agrawal, Data privacy through optimal k-anonymization, in: Proceedings of the 21st International Conference on Data Engineering (ICDE), 2005.
  • 5
    • 39749103172 scopus 로고    scopus 로고
    • J. Domingo-Ferrer, V. Torra, Disclosure protection methods and information loss for microdata, in: Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, 2001, pp. 91-110.
    • J. Domingo-Ferrer, V. Torra, Disclosure protection methods and information loss for microdata, in: Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, 2001, pp. 91-110.
  • 6
    • 26944448516 scopus 로고    scopus 로고
    • Ordinal, continuous and heterogeneous k-anonymity through microaggregation
    • Domingo-Ferrer J., and Torra V. Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining and Knowledge Discovery 11 2 (2005) 195-212
    • (2005) Data Mining and Knowledge Discovery , vol.11 , Issue.2 , pp. 195-212
    • Domingo-Ferrer, J.1    Torra, V.2
  • 7
    • 28444499680 scopus 로고    scopus 로고
    • B.C.M. Fung, K. Wang, P.S. Yu, Top-down specialization for information and privacy preservation, in: Proceedings of the 21st International Conference on Data Engineering (ICDE), 2005.
    • B.C.M. Fung, K. Wang, P.S. Yu, Top-down specialization for information and privacy preservation, in: Proceedings of the 21st International Conference on Data Engineering (ICDE), 2005.
  • 8
    • 0242625276 scopus 로고    scopus 로고
    • V. S. Iyengar, Transforming data to satisfy privacy constraints, in: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2002.
    • V. S. Iyengar, Transforming data to satisfy privacy constraints, in: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2002.
  • 9
    • 29844444250 scopus 로고    scopus 로고
    • K. LeFevre, D. DeWitt, R. Ramakrishnan, Incognito: efficient full-domain k-anonymity, in: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), 2005.
    • K. LeFevre, D. DeWitt, R. Ramakrishnan, Incognito: efficient full-domain k-anonymity, in: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), 2005.
  • 10
    • 33749606641 scopus 로고    scopus 로고
    • K. LeFevre, D. DeWitt, R. Ramakrishnan, Mondrian multidimensional k-anonymity, in: Proceedings of the 22nd International Conference on Data Engineering (ICDE), 2006.
    • K. LeFevre, D. DeWitt, R. Ramakrishnan, Mondrian multidimensional k-anonymity, in: Proceedings of the 22nd International Conference on Data Engineering (ICDE), 2006.
  • 11
    • 34548805858 scopus 로고    scopus 로고
    • N. Li, T. Li, S. Venkatasubramanian, t-closeness: privacy beyond k-anonymity and ℓ-diversity, in: Proceedings of the 23rd International Conference on Data Engineering (ICDE), 2007.
    • N. Li, T. Li, S. Venkatasubramanian, t-closeness: privacy beyond k-anonymity and ℓ-diversity, in: Proceedings of the 23rd International Conference on Data Engineering (ICDE), 2007.
  • 12
    • 33749607006 scopus 로고    scopus 로고
    • A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, ℓ-diversity: privacy beyond k-anonymity, in: Proceedings of the 22nd International Conference on Data Engineering (ICDE), 2006.
    • A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, ℓ-diversity: privacy beyond k-anonymity, in: Proceedings of the 22nd International Conference on Data Engineering (ICDE), 2006.
  • 13
    • 3142691086 scopus 로고    scopus 로고
    • A. Meyerson, R. Williams, On the complexity of optimal k-anonymity, in: Proceedings of the 23rd ACM Symposium on Principles of Database Systems (PODS), 2004.
    • A. Meyerson, R. Williams, On the complexity of optimal k-anonymity, in: Proceedings of the 23rd ACM Symposium on Principles of Database Systems (PODS), 2004.
  • 14
    • 0000819568 scopus 로고
    • The number of partitions of a set
    • Rota G.C. The number of partitions of a set. American Mathematical Monthly 71 5 (1964) 498-504
    • (1964) American Mathematical Monthly , vol.71 , Issue.5 , pp. 498-504
    • Rota, G.C.1
  • 15
    • 39749112807 scopus 로고    scopus 로고
    • R. Rymon, Search through systematic set enumeration, in: Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR-02), 1992.
    • R. Rymon, Search through systematic set enumeration, in: Proceedings of the 3rd International Conference on Principles of Knowledge Representation and Reasoning (KR-02), 1992.
  • 17
    • 39749123508 scopus 로고    scopus 로고
    • P. Samarati, L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory, 1998.
    • P. Samarati, L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory, 1998.
  • 20
    • 19544380211 scopus 로고    scopus 로고
    • K. Wang, P.S. Yu, S. Chakraborty, Bottom-up generalization: a data mining solution to privacy protection, in: Proceedings of the 4th International Conference on Data Mining (ICDM), 2004.
    • K. Wang, P.S. Yu, S. Chakraborty, Bottom-up generalization: a data mining solution to privacy protection, in: Proceedings of the 4th International Conference on Data Mining (ICDM), 2004.
  • 21
    • 0000835392 scopus 로고
    • Opus: an efficient admissible algorithm for unordered search
    • Webb G.I. Opus: an efficient admissible algorithm for unordered search. Journal of Artificial Intelligence Research (1995) 431-465
    • (1995) Journal of Artificial Intelligence Research , pp. 431-465
    • Webb, G.I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.