메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1091-1096

Comparisons of K-anonymization and randomization schemes under linking attacks

Author keywords

[No Author keywords available]

Indexed keywords

CONFIDENTIALITY MAP; RANDOMIZATION SCHEMES;

EID: 42149134082     PISSN: 15504786     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDM.2006.40     Document Type: Conference Paper
Times cited : (12)

References (9)
  • 4
    • 0011583645 scopus 로고    scopus 로고
    • Los Alamos National Laboratory Technical Report, LA-UR-01-6428
    • G.T.Duncan, S.A.Keller-McNulty, and S.L.Stoke. Disclosure risk vs. data utility: The r-u confidentiality map. Los Alamos National Laboratory Technical Report, LA-UR-01-6428.
    • Duncan, G.T.1    Keller-McNulty, S.A.2    Stoke, S.L.3
  • 7
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • Technical report
    • P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, 1998.
    • (1998)
    • Samarati, P.1    Sweeney, L.2
  • 8
    • 0013776710 scopus 로고
    • Randomized response: A survey technique for eliminating evasive answer bias
    • March
    • S. L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60(309):63-69, March 1965.
    • (1965) Journal of the American Statistical Association , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.