메뉴 건너뛰기




Volumn 4890 LNCS, Issue , 2008, Pages 33-55

Allowing privacy protection algorithms to jump out of local optimums: An ordered greed framework

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA STRUCTURES; QUALITY MANAGEMENT;

EID: 41849147857     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78478-4_3     Document Type: Article
Times cited : (3)

References (30)
  • 1
    • 77049087087 scopus 로고    scopus 로고
    • Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing Tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, 3363, pp. 246-258. Springer, Heidelberg (2004)
    • Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing Tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 246-258. Springer, Heidelberg (2004)
  • 3
    • 34548547007 scopus 로고    scopus 로고
    • Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: Blocking anonymity threats raised by frequent itemset mining. In: Proc. of 5th IEEE Int'l Conf. on Data Mining, ICDM 2005, pp. 561-564 (2005)
    • Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: Blocking anonymity threats raised by frequent itemset mining. In: Proc. of 5th IEEE Int'l Conf. on Data Mining, ICDM 2005, pp. 561-564 (2005)
  • 5
    • 38049126170 scopus 로고    scopus 로고
    • Efficient k-Anonymization using clustering techniques
    • Kotagiri, R, Radha Krishna, P, Mohania, M, Nantajeewarawat, E, eds, DASFAA 2007, Springer, Heidelberg
    • Byun, J., Kamra, A., Bertino, E., Li, N.: Efficient k-Anonymization using clustering techniques. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 188-200. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4443 , pp. 188-200
    • Byun, J.1    Kamra, A.2    Bertino, E.3    Li, N.4
  • 6
    • 41849138431 scopus 로고    scopus 로고
    • Utility Preserving k-Anonymity
    • Technical report MUN-CS 2006-01, Dept. Computer Science, Memorial University
    • Chaytor, R.: Utility Preserving k-Anonymity. Technical report MUN-CS 2006-01, Dept. Computer Science, Memorial University (2006)
    • (2006)
    • Chaytor, R.1
  • 7
    • 28444499680 scopus 로고    scopus 로고
    • Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: Proc. of 21st IEEE Int'l Conf. on Data Engineering, ICDE 2005, pp. 205-216 (2005)
    • Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: Proc. of 21st IEEE Int'l Conf. on Data Engineering, ICDE 2005, pp. 205-216 (2005)
  • 8
    • 0242625276 scopus 로고    scopus 로고
    • Iyengar, V.: Transforming data to satisfy privacy constraints. In Proc. of 8th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2002, pp. 279-288 (2002)
    • Iyengar, V.: Transforming data to satisfy privacy constraints. In Proc. of 8th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2002, pp. 279-288 (2002)
  • 9
    • 26444563363 scopus 로고    scopus 로고
    • Jiang, W., Clifton, C.: Privacy-preserving distributed k-anonymity. In: Proc. of 19th IFIP WG 11.3 Working Conf. on Data and Applications Security, DBSec 2005, pp. 166-177 (2005)
    • Jiang, W., Clifton, C.: Privacy-preserving distributed k-anonymity. In: Proc. of 19th IFIP WG 11.3 Working Conf. on Data and Applications Security, DBSec 2005, pp. 166-177 (2005)
  • 11
    • 34548710709 scopus 로고    scopus 로고
    • Aggregate query answering on anonymized tables
    • Int'l Conf. on Data, Engineering, ICDE 2007 2007
    • Koudas, N., Srivastava, D., Yu, T., Zhang, Q.: Aggregate query answering on anonymized tables. In: Proc. of 23rd IEEE Int'l Conf. on Data, Engineering, ICDE 2007 (2007)
    • Proc. of 23rd IEEE
    • Koudas, N.1    Srivastava, D.2    Yu, T.3    Zhang, Q.4
  • 13
    • 33749606641 scopus 로고    scopus 로고
    • Mondrian multidimensional kanonymity
    • Int'l Conf. on Data Engineering, ICDE 2006 2006
    • LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian multidimensional kanonymity. In: Proc. of 22nd IEEE Int'l Conf. on Data Engineering, ICDE 2006 (2006)
    • Proc. of 22nd IEEE
    • LeFevre, K.1    DeWitt, D.2    Ramakrishnan, R.3
  • 14
    • 33749568323 scopus 로고    scopus 로고
    • LeFevre, K., DeWitt, D., Ramakrishnan, R.: Workload-aware anonymization. In: Proc. of 12th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2006, pp. 277-286 (2006)
    • LeFevre, K., DeWitt, D., Ramakrishnan, R.: Workload-aware anonymization. In: Proc. of 12th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2006, pp. 277-286 (2006)
  • 15
    • 34548805858 scopus 로고    scopus 로고
    • S.: T-closeness: privacy beyond k-anonymity and ℓ-diversity
    • Int'l Conf. on Data Engineering, ICDE 2007 2007
    • Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and ℓ-diversity. In: Proc. of IEEE 23rd Int'l Conf. on Data Engineering, ICDE 2007 (2007)
    • Proc. of IEEE 23rd
    • Li, N.1    Li, T.2    Venkatasubramanian3
  • 16
    • 0038756070 scopus 로고    scopus 로고
    • A genetic algorithm based approach to route selection and capacity flow assignments
    • Lin, X., Kwok, Y., Lau, V.: A genetic algorithm based approach to route selection and capacity flow assignments. Computer Communications 26(9), 961-974 (2003)
    • (2003) Computer Communications , vol.26 , Issue.9 , pp. 961-974
    • Lin, X.1    Kwok, Y.2    Lau, V.3
  • 18
    • 33749607006 scopus 로고    scopus 로고
    • Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: ℓ-diversity: privacy beyond k-anonymity. In: Proc. of 22nd IEEE Int'l Conf. on Data Engineering, ICDE 2006 (2006)
    • Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: ℓ-diversity: privacy beyond k-anonymity. In: Proc. of 22nd IEEE Int'l Conf. on Data Engineering, ICDE 2006 (2006)
  • 21
    • 52949126571 scopus 로고    scopus 로고
    • Pandey, R., Chattopadhyay, S.: Low power technology mapping for LUT based FPGA - a genetic algorithm approach. In: Proc. of 16th IEEE Int'l Conf. on VLSI Design, VLSI 2003, pp. 79-84 (2003)
    • Pandey, R., Chattopadhyay, S.: Low power technology mapping for LUT based FPGA - a genetic algorithm approach. In: Proc. of 16th IEEE Int'l Conf. on VLSI Design, VLSI 2003, pp. 79-84 (2003)
  • 22
    • 41849091656 scopus 로고    scopus 로고
    • Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. Technical report SRI-CSL-98-04. SRI International, Computer Science Laboratoy (1998)
    • Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. Technical report SRI-CSL-98-04. SRI International, Computer Science Laboratoy (1998)
  • 24
    • 85150403464 scopus 로고    scopus 로고
    • Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int'l J. on Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 571-588 (2002)
    • Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int'l J. on Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 571-588 (2002)
  • 26
    • 19544380211 scopus 로고    scopus 로고
    • Wang, K., Yu, P., Chakraborty, S.: Bottom-up generalization: a data mining solution to privacy protection. In: Perner, P. (ed.) ICDM 2004. LNCS (LNAI), 3275, pp. 249-256. Springer, Heidelberg (2004)
    • Wang, K., Yu, P., Chakraborty, S.: Bottom-up generalization: a data mining solution to privacy protection. In: Perner, P. (ed.) ICDM 2004. LNCS (LNAI), vol. 3275, pp. 249-256. Springer, Heidelberg (2004)
  • 27
    • 28444438967 scopus 로고    scopus 로고
    • Using Simulated Annealing for k-Anonymity
    • Technical report 2002-07. U.S. Bureau of the Census, Statistical Research Division
    • Winkler, W.: Using Simulated Annealing for k-Anonymity. Technical report 2002-07. U.S. Bureau of the Census, Statistical Research Division (2002)
    • (2002)
    • Winkler, W.1
  • 28
    • 33749571958 scopus 로고    scopus 로고
    • Wong, R., Li, J., Fu, A., Wang, K. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proc. of 12th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2006, pp. 754-759 (2006)
    • Wong, R., Li, J., Fu, A., Wang, K. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proc. of 12th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2006, pp. 754-759 (2006)
  • 30
    • 41849123637 scopus 로고    scopus 로고
    • Utility-based anonymization for privacy preservation with less information loss
    • Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.: Utility-based anonymization for privacy preservation with less information loss. ACM SIGKDD Explorations 8(2), 21-30 (2006)
    • (2006) ACM SIGKDD Explorations , vol.8 , Issue.2 , pp. 21-30
    • Xu, J.1    Wang, W.2    Pei, J.3    Wang, X.4    Shi, B.5    Fu, A.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.