메뉴 건너뛰기




Volumn , Issue , 2007, Pages 283-287

Privacy-aware knowledge discovery from location data

Author keywords

[No Author keywords available]

Indexed keywords

CANNING; ENVIRONMENTAL ENGINEERING; ENVIRONMENTAL MANAGEMENT; ENVIRONMENTAL PROTECTION; INTERNET; MANAGEMENT INFORMATION SYSTEMS; MOBILE COMPUTING; PLANNING; TELECOMMUNICATION; TELECOMMUNICATION EQUIPMENT; URBAN PLANNING; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 48649086112     PISSN: 15516245     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MDM.2007.59     Document Type: Conference Paper
Times cited : (2)

References (22)
  • 4
    • 33646407813 scopus 로고    scopus 로고
    • M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. k-anonymous patterns. In Proceedings of the PKDD 2005, Springer, pp. 10-21.
    • M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. k-anonymous patterns. In Proceedings of the PKDD 2005, Springer, pp. 10-21.
  • 8
    • 27944454864 scopus 로고    scopus 로고
    • Location privacy in mobile systems: A personalized anonymization model
    • B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In Proceedings of the IEEE ICDCS 2005, pp. 620-629, 2005.
    • (2005) Proceedings of the IEEE ICDCS 2005 , pp. 620-629
    • Gedik, B.1    Liu, L.2
  • 11
    • 18744393736 scopus 로고    scopus 로고
    • Hiding sensitive patterns in association rules mining
    • G. Lee, C.-Y. Chang, and A. L. P. Chen. Hiding sensitive patterns in association rules mining. In COMPSAC 2004, pp. 424-429.
    • COMPSAC 2004 , pp. 424-429
    • Lee, G.1    Chang, C.-Y.2    Chen, A.L.P.3
  • 12
    • 33751394416 scopus 로고    scopus 로고
    • k-anonymity in databases with timestamped data
    • S. Mascetti, C. Bettini, X. S. Wang, and S. Jajodia. k-anonymity in databases with timestamped data. In IEEE TIME 2006, pp. 177-186.
    • (2006) IEEE TIME , pp. 177-186
    • Mascetti, S.1    Bettini, C.2    Wang, X.S.3    Jajodia, S.4
  • 13
    • 25844456648 scopus 로고    scopus 로고
    • Maximizing accuracy of shared databases when concealing sensitive patterns
    • S. Menon, S. Sarkar, and S. Mukherjee. Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research, 16(3):256-270, 2005.
    • (2005) Information Systems Research , vol.16 , Issue.3 , pp. 256-270
    • Menon, S.1    Sarkar, S.2    Mukherjee, S.3
  • 14
    • 0040871512 scopus 로고
    • Knowledge discovery as a threat to database security
    • AAAI/MIT Press
    • D. E. O'Leary. Knowledge discovery as a threat to database security. In Knowledge Discovery in Databases, pages 507-516. AAAI/MIT Press, 1991.
    • (1991) Knowledge Discovery in Databases , pp. 507-516
    • O'Leary, D.E.1
  • 16
    • 84880954718 scopus 로고    scopus 로고
    • An experimental study of distortion-based techniques for association rule hiding
    • E. D. Pontikakis, A. A. Tsitsonis, and V. S. Verykios. An experimental study of distortion-based techniques for association rule hiding. In DBSEC 2004, pp. 325-339.
    • DBSEC 2004 , pp. 325-339
    • Pontikakis, E.D.1    Tsitsonis, A.A.2    Verykios, V.S.3
  • 17
    • 70349118745 scopus 로고    scopus 로고
    • Generalizing data to provide anonymity when disclosing information (Extended Abstract)
    • P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information (Extended Abstract). In PODS 1998.
    • PODS 1998
    • Samarati, P.1    Sweeney, L.2
  • 18
    • 0344990562 scopus 로고    scopus 로고
    • Using unknowns to prevent discovery of association rules
    • Y. Saygin, V. S. Verykios, and C. Clifton. Using unknowns to prevent discovery of association rules. ACM SIGMOD Record, 30(4):45-54, 2001.
    • (2001) ACM SIGMOD Record , vol.30 , Issue.4 , pp. 45-54
    • Saygin, Y.1    Verykios, V.S.2    Clifton, C.3
  • 20
    • 34548591826 scopus 로고    scopus 로고
    • A border-based approach for hiding sensitive frequent itemsets
    • X. Sun and P. S. Yu. A border-based approach for hiding sensitive frequent itemsets. In Proceedings of the IEEE ICDM 2005, pp. 426-433.
    • (2005) Proceedings of the IEEE ICDM , pp. 426-433
    • Sun, X.1    Yu, P.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.